Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
adaFirmar.exe

Overview

General Information

Sample name:adaFirmar.exe
Analysis ID:1545329
MD5:6c3d86b342f768fdb57e3d1fcf543cce
SHA1:a449043e7eae780a0b9a66dc995cdb612cf4c41d
SHA256:95a8277f391d876e1c6686ff255a123573bf4649f8600160e155ef325c1f2b55
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • adaFirmar.exe (PID: 1996 cmdline: "C:\Users\user\Desktop\adaFirmar.exe" MD5: 6C3D86B342F768FDB57E3D1FCF543CCE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: adaFirmar.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\adaFirmar.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: adaFirmar.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: R:\TTelecomunicaciones\COITT_macFirmar\obj\Release\adaFirmar.pdb source: adaFirmar.exe
Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: adaFirmar.exeString found in binary or memory: http://albertmonter.com
Source: adaFirmar.exe, 00000000.00000002.3310227325.0000000001186000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://albertmonter.com-0b2b9608ed53ToD
Source: adaFirmar.exeString found in binary or memory: http://albertmonter.comD
Source: adaFirmar.exe, 00000000.00000002.3311601309.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://albertmonter.comH
Source: adaFirmar.exeString found in binary or memory: http://albertmonter.comX
Source: adaFirmar.exeString found in binary or memory: http://www.aiim.org/pdfa/ns/id/
Source: adaFirmar.exeString found in binary or memory: http://www.color.org;colorspace.rgb.is.not.allowed_all.the.fonts.must.be.embedded.this.one.isn.t.1Mt
Source: adaFirmar.exeString found in binary or memory: http://www.xfa.org/schema/xfa-data/1.0/
Source: adaFirmar.exeString found in binary or memory: https://?1.not.found.as.file.or.resource_you.can.only.add.a.writer.to.a.pdfdocument.once
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_055C06E00_2_055C06E0
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_055C06D80_2_055C06D8
Source: adaFirmar.exe, 00000000.00000002.3310429531.000000000132E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs adaFirmar.exe
Source: adaFirmar.exe, 00000000.00000002.3311601309.0000000003411000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs adaFirmar.exe
Source: adaFirmar.exe, 00000000.00000002.3311601309.0000000003411000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: lU,\\StringFileInfo\\000004B0\\OriginalFilenameL. vs adaFirmar.exe
Source: adaFirmar.exe, 00000000.00000000.2045045375.00000000007E2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameitextsharp.dll4 vs adaFirmar.exe
Source: adaFirmar.exeBinary or memory string: OriginalFilenameitextsharp.dll4 vs adaFirmar.exe
Source: adaFirmar.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean3.winEXE@1/0@1/0
Source: C:\Users\user\Desktop\adaFirmar.exeMutant created: NULL
Source: adaFirmar.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: adaFirmar.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\adaFirmar.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: adaFirmar.exeString found in binary or memory: codabar.must.have.one.of.abcd.as.start.stop.character=Codabar must have one of 'ABCD' as start/stop character.
Source: adaFirmar.exeString found in binary or memory: codabar.must.have.one.of.abcd.as.start.stop.character=Codabar must have one of 'ABCD' as start/stop character.
Source: adaFirmar.exeString found in binary or memory: in.codabar.start.stop.characters.are.only.allowed.at.the.extremes=In codabar worden start/stop karakters enkel toegelaten bij begin en einde van de string.
Source: adaFirmar.exeString found in binary or memory: in.codabar.start.stop.characters.are.only.allowed.at.the.extremes=In codabar worden start/stop karakters enkel toegelaten bij begin en einde van de string.
Source: adaFirmar.exeString found in binary or memory: in.codabar.start.stop.characters.are.only.allowed.at.the.extremes=In codabar, start/stop characters are only allowed at the extremes.
Source: adaFirmar.exeString found in binary or memory: in.codabar.start.stop.characters.are.only.allowed.at.the.extremes=In codabar, start/stop characters are only allowed at the extremes.
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\adaFirmar.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Source: adaFirmar.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: adaFirmar.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: adaFirmar.exeStatic file information: File size 6352896 > 1048576
Source: C:\Users\user\Desktop\adaFirmar.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: adaFirmar.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x5e6800
Source: adaFirmar.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: adaFirmar.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: R:\TTelecomunicaciones\COITT_macFirmar\obj\Release\adaFirmar.pdb source: adaFirmar.exe
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_015213C8 push ds; iretd 0_2_015213E5
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_01520F60 push ds; iretd 0_2_01520F85
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_01521296 push ds; iretd 0_2_015212FD
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_01520F04 push ds; iretd 0_2_01520F15
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_01520F20 push ds; iretd 0_2_01520F3D
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_015209A0 push ds; iretd 0_2_015209CD
Source: C:\Users\user\Desktop\adaFirmar.exeCode function: 0_2_01521328 push ds; iretd 0_2_01521345
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeMemory allocated: 17A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeMemory allocated: 3410000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeMemory allocated: 5410000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\adaFirmar.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
adaFirmar.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
171.39.242.20.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://albertmonter.com-0b2b9608ed53ToDadaFirmar.exe, 00000000.00000002.3310227325.0000000001186000.00000004.00000010.00020000.00000000.sdmpfalse
      unknown
      http://www.color.org;colorspace.rgb.is.not.allowed_all.the.fonts.must.be.embedded.this.one.isn.t.1MtadaFirmar.exefalse
        unknown
        http://www.aiim.org/pdfa/ns/id/adaFirmar.exefalse
          unknown
          https://?1.not.found.as.file.or.resource_you.can.only.add.a.writer.to.a.pdfdocument.onceadaFirmar.exefalse
            unknown
            http://albertmonter.comHadaFirmar.exe, 00000000.00000002.3311601309.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              http://albertmonter.comXadaFirmar.exefalse
                unknown
                http://albertmonter.comadaFirmar.exefalse
                  unknown
                  http://albertmonter.comDadaFirmar.exefalse
                    unknown
                    http://www.xfa.org/schema/xfa-data/1.0/adaFirmar.exefalse
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1545329
                      Start date and time:2024-10-30 12:49:55 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 27s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:adaFirmar.exe
                      Detection:CLEAN
                      Classification:clean3.winEXE@1/0@1/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 58
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: adaFirmar.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.156470591632779
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      • Win32 Executable (generic) a (10002005/4) 49.75%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Windows Screen Saver (13104/52) 0.07%
                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                      File name:adaFirmar.exe
                      File size:6'352'896 bytes
                      MD5:6c3d86b342f768fdb57e3d1fcf543cce
                      SHA1:a449043e7eae780a0b9a66dc995cdb612cf4c41d
                      SHA256:95a8277f391d876e1c6686ff255a123573bf4649f8600160e155ef325c1f2b55
                      SHA512:210f6cdcb5656c794429b177f3d57ece10a80934e356d78c388d7ddd9122364311443d8d6d23a2ea88f75a355d9c448b345efdac3f4aac52e54706a83daa6738
                      SSDEEP:98304:pbtkC76Ouj7Fn0vWwgh9nkW1PvbfXwHiRNgII7:xqvFn0Jgh1/1PvjXwHiRNg
                      TLSH:B356AE1833E89A26C57B4672D0F2C53292E5F91B66ABF74F64FCB96D1C43B00D902927
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...yy.^.................h^.........~.^.. ....^...@.. .......................`a...........@................................
                      Icon Hash:074775496592d623
                      Entrypoint:0x9e877e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x5E9D7979 [Mon Apr 20 10:29:13 2020 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x5e87300x4b.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ec0000x27e18.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x6140000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x5ea0000x1c.sdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x5e67840x5e68001ea62a6f330f0a9976d4d8a3a8132d63unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .sdata0x5ea0000x1380x200925ac460d37a5796e004c44d4f0f53b2False0.232421875data1.7140550286115854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x5ec0000x27e180x2800000e6b696a58858bc8e3f47057b4de8caFalse0.48763427734375data5.2846177678652575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x6140000xc0x2002df17c137799002be87a5061c3efe3bbFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x5ec5e00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 00.4072814385425293
                      RT_ICON0x5fce080x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 00.49747740172377547
                      RT_ICON0x6062b00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 00.5728743068391867
                      RT_ICON0x60b7380x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.6052196504487483
                      RT_ICON0x60f9600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.6379668049792531
                      RT_ICON0x611f080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.7080206378986866
                      RT_ICON0x612fb00x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.7766393442622951
                      RT_ICON0x6139380x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.7225177304964538
                      RT_GROUP_ICON0x613da00x76data0.7627118644067796
                      RT_VERSION0x5ec2380x3a4data0.41416309012875535
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 30, 2024 12:51:21.272356033 CET5349265162.159.36.2192.168.2.5
                      Oct 30, 2024 12:51:21.936968088 CET6171453192.168.2.51.1.1.1
                      Oct 30, 2024 12:51:21.955127001 CET53617141.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 30, 2024 12:51:21.936968088 CET192.168.2.51.1.1.10x1532Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 30, 2024 12:51:21.955127001 CET1.1.1.1192.168.2.50x1532Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:07:50:46
                      Start date:30/10/2024
                      Path:C:\Users\user\Desktop\adaFirmar.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\adaFirmar.exe"
                      Imagebase:0x7e0000
                      File size:6'352'896 bytes
                      MD5 hash:6C3D86B342F768FDB57E3D1FCF543CCE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:30.6%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:134
                        Total number of Limit Nodes:14
                        execution_graph 6101 170a9f0 6102 170aa12 SetWindowLongW 6101->6102 6104 170aa59 6102->6104 6022 5a72be6 6023 5a72c12 DispatchMessageW 6022->6023 6024 5a72c3b 6022->6024 6025 5a72c27 6023->6025 6024->6023 6026 170bbb2 6027 170bc02 VerLanguageNameW 6026->6027 6028 170bc10 6027->6028 6079 170b134 6080 170b155 6079->6080 6081 170b194 6080->6081 6082 55c5769 KiUserExceptionDispatcher 6080->6082 6083 55c57e0 KiUserExceptionDispatcher 6080->6083 6084 55c57d1 KiUserExceptionDispatcher 6080->6084 6082->6080 6083->6080 6084->6080 6117 170b074 6118 170b0be CreateActCtxA 6117->6118 6119 170b110 6118->6119 6029 170aab6 6030 170ab10 6029->6030 6031 170aae5 SHAutoComplete 6029->6031 6030->6031 6032 170aafa 6031->6032 6085 5a721e0 6086 5a72202 GetFileVersionInfoW 6085->6086 6088 5a72254 6086->6088 6089 170bd39 6090 170bd6a DrawTextExW 6089->6090 6092 170bdc3 6090->6092 6033 170be3a 6034 170be66 KiUserCallbackDispatcher 6033->6034 6035 170be9a 6033->6035 6036 170be7b 6034->6036 6035->6034 6071 5a72bad 6074 5a72be6 DispatchMessageW 6071->6074 6073 5a72c27 6074->6073 5966 5a71a2a 5967 5a71a5f SendMessageW 5966->5967 5968 5a71a8a 5966->5968 5969 5a71a74 5967->5969 5968->5967 6120 170aa7d 6121 170aab6 SHAutoComplete 6120->6121 6123 170aafa 6121->6123 6037 170b0be CreateActCtxA 6038 170b110 6037->6038 6124 5a718a9 6126 5a718de SetWindowTextW 6124->6126 6127 5a7192a 6126->6127 6105 170bdff 6106 170be3a KiUserCallbackDispatcher 6105->6106 6108 170be7b 6106->6108 6128 170a87f 6129 170a8ae OleInitialize 6128->6129 6131 170a8e8 6129->6131 6039 5a726f6 6040 5a7275f 6039->6040 6041 5a7272b PostMessageW 6039->6041 6040->6041 6042 5a72740 6041->6042 6097 170ab26 6098 170ab56 RegOpenKeyExW 6097->6098 6100 170abe4 6098->6100 6152 5a71e30 6155 5a71e60 MoveFileW 6152->6155 6154 5a71ed3 6155->6154 6075 170bb68 6076 170bbb2 VerLanguageNameW 6075->6076 6078 170bc10 6076->6078 6132 5a726be 6133 5a726f6 PostMessageW 6132->6133 6135 5a72740 6133->6135 6043 5a72a7a 6044 5a72ae6 6043->6044 6045 5a72ab2 PeekMessageW 6043->6045 6044->6045 6046 5a72ac7 6045->6046 6136 170b46d 6137 170b49e LoadLibraryShim 6136->6137 6139 170b4f8 6137->6139 6047 170a8ae 6048 170a910 6047->6048 6049 170a8da OleInitialize 6047->6049 6048->6049 6050 170a8e8 6049->6050 6113 170a5af 6114 170a5d6 DuplicateHandle 6113->6114 6116 170a622 6114->6116 5981 5a71e86 5983 5a71eac MoveFileW 5981->5983 5984 5a71ed3 5983->5984 6160 5a72046 6162 5a7209e DeleteFileW 6160->6162 6163 5a720e0 6162->6163 6051 170aa12 6052 170aa44 SetWindowLongW 6051->6052 6053 170aa6f 6051->6053 6054 170aa59 6052->6054 6053->6052 5985 170b155 5986 170b172 5985->5986 5987 170b194 5986->5987 5991 55c5769 5986->5991 5995 55c57d1 5986->5995 5999 55c57e0 5986->5999 5992 55c57e8 KiUserExceptionDispatcher 5991->5992 5993 55c5777 5991->5993 5994 55c580f 5992->5994 5993->5986 5994->5986 5996 55c57e0 5995->5996 5997 55c57e1 KiUserExceptionDispatcher 5995->5997 5996->5997 5998 55c580f 5997->5998 5998->5986 6000 55c57e1 KiUserExceptionDispatcher 5999->6000 6001 55c580f 6000->6001 6001->5986 6164 5a72a42 6165 5a72a7a PeekMessageW 6164->6165 6167 5a72ac7 6165->6167 6006 170a5d6 6007 170a614 DuplicateHandle 6006->6007 6008 170a64c 6006->6008 6009 170a622 6007->6009 6008->6007 6055 170a69a 6056 170a6c6 SetErrorMode 6055->6056 6057 170a6ef 6055->6057 6058 170a6db 6056->6058 6057->6056 6140 170a65a 6141 170a69a SetErrorMode 6140->6141 6143 170a6db 6141->6143 6148 170ac1d 6149 170ac5e RegQueryValueExW 6148->6149 6151 170ace7 6149->6151 6156 5a71a08 6157 5a71a2a SendMessageW 6156->6157 6159 5a71a74 6157->6159 6109 5a7211f 6111 5a72152 GetFileVersionInfoSizeW 6109->6111 6112 5a72197 6111->6112 6018 5a7209e 6019 5a720c4 DeleteFileW 6018->6019 6021 5a720e0 6019->6021

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 55c06e0-55c0b00 1035 55c0b02 call 1520606 0->1035 1036 55c0b02 call 15205e7 0->1036 99 55c0b08-55c0bd9 1037 55c0bdb call 1520606 99->1037 1038 55c0bdb call 15205e7 99->1038 120 55c0be1-55c3584 821 55c3590-55c4119 120->821 1004 55c4121-55c4129 821->1004 1005 55c4131-55c4219 1004->1005 1024 55c4221-55c4223 1005->1024 1025 55c422a-55c4288 1024->1025 1035->99 1036->99 1037->120 1038->120
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3312655308.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_55c0000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$0 k$e$z$}
                        • API String ID: 0-4228288086
                        • Opcode ID: 8e688f89a9c6a4bf0c2fb61b5958384d1530bdd037f167efe6f8f81815aad664
                        • Instruction ID: 66af8adfb0864a0795ffdcf9606f36e0a3a463c888c82aa4b72c44125d28769f
                        • Opcode Fuzzy Hash: 8e688f89a9c6a4bf0c2fb61b5958384d1530bdd037f167efe6f8f81815aad664
                        • Instruction Fuzzy Hash: D4939D347002148FCB199B78C458AAD7BF6AF8A309F2540FAE40ADB7A1DB769D45CF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1039 55c06d8-55c0b00 2076 55c0b02 call 1520606 1039->2076 2077 55c0b02 call 15205e7 1039->2077 1138 55c0b08-55c0bd9 2074 55c0bdb call 1520606 1138->2074 2075 55c0bdb call 15205e7 1138->2075 1159 55c0be1-55c3584 1860 55c3590-55c4119 1159->1860 2043 55c4121-55c4129 1860->2043 2044 55c4131-55c4219 2043->2044 2063 55c4221-55c4223 2044->2063 2064 55c422a-55c4288 2063->2064 2074->1159 2075->1159 2076->1138 2077->1138
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3312655308.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_55c0000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$0 k$e$z$}
                        • API String ID: 0-4228288086
                        • Opcode ID: a1f953da831cccdfa98f22dc0a0dd11bca5716421ace2b6c97aeca1b71adb399
                        • Instruction ID: 787350222a24f3119e3478d0ff87fe8139c4690ae60057ce83fb20685bf5fd55
                        • Opcode Fuzzy Hash: a1f953da831cccdfa98f22dc0a0dd11bca5716421ace2b6c97aeca1b71adb399
                        • Instruction Fuzzy Hash: AF939D347002148FCB199B78C458AAD7BF6AF8A309F2540FAE40ADB7A1DB769D45CF41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2078 55c57e0-55c583e KiUserExceptionDispatcher 2085 55c5840-55c584c 2078->2085 2086 55c58b3-55c58cd 2078->2086 2087 55c584e-55c5857 2085->2087 2088 55c5888 2085->2088 2092 55c58cf-55c593a 2086->2092 2093 55c5940-55c5a80 2086->2093 2090 55c5859-55c5862 2087->2090 2091 55c5864-55c5875 2087->2091 2094 55c5893-55c58b0 2088->2094 2099 55c587a-55c587e 2090->2099 2091->2099 2092->2093 2130 55c5ace-55c5adf 2093->2130 2131 55c5a82-55c5a8e 2093->2131 2099->2086 2102 55c5880-55c5886 2099->2102 2102->2087 2102->2088 2132 55c5ae4-55c5aeb 2130->2132 2131->2132 2133 55c5a90-55c5a99 2131->2133 2134 55c5a9b 2133->2134 2135 55c5aa6-55c5ab7 2133->2135 2139 55c5aa4 2134->2139 2140 55c5abc-55c5ac2 2135->2140 2139->2140 2140->2130 2143 55c5ac4-55c5aca 2140->2143 2143->2133 2144 55c5acc 2143->2144 2144->2132
                        APIs
                        • KiUserExceptionDispatcher.NTDLL ref: 055C57FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.3312655308.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_55c0000_adaFirmar.jbxd
                        Similarity
                        • API ID: DispatcherExceptionUser
                        • String ID:
                        • API String ID: 6842923-0
                        • Opcode ID: 7187cf236627c6da32301040e0e47987b5144e0dd87c990d4ed89b5fa71ef075
                        • Instruction ID: fbd0937699906928aeebc11353a86a79507aca1b83dc23533ca71c8f330a1cd4
                        • Opcode Fuzzy Hash: 7187cf236627c6da32301040e0e47987b5144e0dd87c990d4ed89b5fa71ef075
                        • Instruction Fuzzy Hash: 8B816E30A042048FDB04DBF9C9506EE7BF2BFC9319B1041A9D105EB764EB75AC49CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2146 170ab26-170abb1 2150 170abb3 2146->2150 2151 170abb6-170abcd 2146->2151 2150->2151 2153 170ac0f-170ac14 2151->2153 2154 170abcf-170abe2 RegOpenKeyExW 2151->2154 2153->2154 2155 170abe4-170ac0c 2154->2155 2156 170ac16-170ac1b 2154->2156 2156->2155
                        APIs
                        • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0170ABD5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 130ca9238f8feeeec20930e8a356215c058a31f56abc479fe709fd75524d6fc1
                        • Instruction ID: 0d2e35bbdcd9a0152917a0b5c38df456cdeff4e77be5574612b5ef605f20c824
                        • Opcode Fuzzy Hash: 130ca9238f8feeeec20930e8a356215c058a31f56abc479fe709fd75524d6fc1
                        • Instruction Fuzzy Hash: DE31A472404384AFE7228B15CC45FA7BFFCEF06210F04859AE9858B653D264A54DCB71

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2161 170ac1d-170ac9b 2164 170aca0-170aca9 2161->2164 2165 170ac9d 2161->2165 2166 170acab 2164->2166 2167 170acae-170acb4 2164->2167 2165->2164 2166->2167 2168 170acb6 2167->2168 2169 170acb9-170acd0 2167->2169 2168->2169 2171 170acd2-170ace5 RegQueryValueExW 2169->2171 2172 170ad07-170ad0c 2169->2172 2173 170ace7-170ad04 2171->2173 2174 170ad0e-170ad13 2171->2174 2172->2171 2174->2173
                        APIs
                        • RegQueryValueExW.KERNELBASE(?,00000E24,9D8490EF,00000000,00000000,00000000,00000000), ref: 0170ACD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: f11725b2428b6b29758db3156afd3eb178ac5a6bcebe7fffc7b3ef2d48827442
                        • Instruction ID: 4ffe54a33fc271b3d0d70383fb746f0ec5e637804394bd882fc97d46d18f8f3c
                        • Opcode Fuzzy Hash: f11725b2428b6b29758db3156afd3eb178ac5a6bcebe7fffc7b3ef2d48827442
                        • Instruction Fuzzy Hash: F53181755093849FE722CB25CC44FA6BFFCEF06214F08849AE985CB293D264E549CB71

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2178 55c5769-55c5775 2179 55c57e8-55c583e KiUserExceptionDispatcher 2178->2179 2180 55c5777-55c5784 2178->2180 2192 55c5840-55c584c 2179->2192 2193 55c58b3-55c58cd 2179->2193 2181 55c5786-55c57b6 2180->2181 2182 55c57c1-55c57c9 2180->2182 2181->2182 2194 55c584e-55c5857 2192->2194 2195 55c5888 2192->2195 2199 55c58cf-55c593a 2193->2199 2200 55c5940-55c5a80 2193->2200 2197 55c5859-55c5862 2194->2197 2198 55c5864-55c5875 2194->2198 2201 55c5893-55c58b0 2195->2201 2206 55c587a-55c587e 2197->2206 2198->2206 2199->2200 2237 55c5ace-55c5adf 2200->2237 2238 55c5a82-55c5a8e 2200->2238 2206->2193 2209 55c5880-55c5886 2206->2209 2209->2194 2209->2195 2239 55c5ae4-55c5aeb 2237->2239 2238->2239 2240 55c5a90-55c5a99 2238->2240 2241 55c5a9b 2240->2241 2242 55c5aa6-55c5ab7 2240->2242 2246 55c5aa4 2241->2246 2247 55c5abc-55c5ac2 2242->2247 2246->2247 2247->2237 2250 55c5ac4-55c5aca 2247->2250 2250->2240 2251 55c5acc 2250->2251 2251->2239
                        APIs
                        • KiUserExceptionDispatcher.NTDLL ref: 055C57FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.3312655308.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_55c0000_adaFirmar.jbxd
                        Similarity
                        • API ID: DispatcherExceptionUser
                        • String ID:
                        • API String ID: 6842923-0
                        • Opcode ID: 8a127769906fe7a58ac764ac5a0f04134a41748af4f81bbdbff3b483e4d9db3a
                        • Instruction ID: d790bf23f957f1ab668487223b16303a10d12edd34aeed5538e2d0ce837f7ba5
                        • Opcode Fuzzy Hash: 8a127769906fe7a58ac764ac5a0f04134a41748af4f81bbdbff3b483e4d9db3a
                        • Instruction Fuzzy Hash: 15314D31F042048FDB04DBF8D554A9EBBF2FB89318F2481A9D105EB391EB75AC468B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2253 5a72046-5a720c2 2255 5a720c7-5a720d0 2253->2255 2256 5a720c4 2253->2256 2257 5a720d2-5a720f2 DeleteFileW 2255->2257 2258 5a72111-5a72116 2255->2258 2256->2255 2261 5a720f4-5a72110 2257->2261 2262 5a72118-5a7211d 2257->2262 2258->2257 2262->2261
                        APIs
                        • DeleteFileW.KERNELBASE(?), ref: 05A720D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: 1606eba6a1fdbeb68949068e68d6d5907f9527d0c31fe232c3e82abd87d2ffb2
                        • Instruction ID: 66b30a7c3a772506d3bf64889bfc81243258a045a5f7d85690a5fa0961014f29
                        • Opcode Fuzzy Hash: 1606eba6a1fdbeb68949068e68d6d5907f9527d0c31fe232c3e82abd87d2ffb2
                        • Instruction Fuzzy Hash: B5315C7550E3C05FD7138B259C65A92BFB4AF03210F0A84DBDD85CF2A3D229A849C772

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2264 5a71e30-5a71eaa 2267 5a71eaf-5a71eb5 2264->2267 2268 5a71eac 2264->2268 2269 5a71eb7 2267->2269 2270 5a71eba-5a71ec3 2267->2270 2268->2267 2269->2270 2271 5a71ec5-5a71ee5 MoveFileW 2270->2271 2272 5a71f04-5a71f09 2270->2272 2275 5a71ee7-5a71f03 2271->2275 2276 5a71f0b-5a71f10 2271->2276 2272->2271 2276->2275
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: 370c61364ea60cdf5e511f7aa3cde3c8780f5e4c30d68a88dbc774bd8cd3d0ad
                        • Instruction ID: 7138db27e04ca0b681003188bb7133f2d6560a68f31f551d830b54ced03ac3db
                        • Opcode Fuzzy Hash: 370c61364ea60cdf5e511f7aa3cde3c8780f5e4c30d68a88dbc774bd8cd3d0ad
                        • Instruction Fuzzy Hash: 26312A7150E3C59FDB138B25DC55A62BFB8AF03220F0D84DBD885CF1A3D6689848CB62

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2278 170b074-170b0bb 2279 170b0be-170b109 CreateActCtxA 2278->2279 2280 170b110-170b132 2279->2280
                        APIs
                        • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 0170B109
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: fbb8bc12d7de2e9ed19b4965a062a37fe2cb51890840e5d89c337577f61c4675
                        • Instruction ID: 48c3eb244c1ed345b4a1259abb088658a7f0c3372a375d36d98ed001b57366f6
                        • Opcode Fuzzy Hash: fbb8bc12d7de2e9ed19b4965a062a37fe2cb51890840e5d89c337577f61c4675
                        • Instruction Fuzzy Hash: F82195754493C06FD3138B259C51B62BFB8EF47610F0A41DBE884DB653D229A919C7B2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2282 5a739ec-5a73a33 2283 5a73a36-5a73a8e RegQueryValueExW 2282->2283 2285 5a73a94-5a73aaa 2283->2285
                        APIs
                        • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 05A73A86
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: bea5d463927d9a709b237e553cf4a0de0412eddae098fe5398566253569a97ec
                        • Instruction ID: 602208e453404373df7fa5c56d5fa2885adcf64a830a750559efdcd1b4812c63
                        • Opcode Fuzzy Hash: bea5d463927d9a709b237e553cf4a0de0412eddae098fe5398566253569a97ec
                        • Instruction Fuzzy Hash: 6C21C5755093C06FD3138B25CC51B72BFB8EF87610F0985CBE8849B693D2256919C7B2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2286 170bb68-170bc26 VerLanguageNameW
                        APIs
                        • VerLanguageNameW.KERNELBASE(?,00000E24,?,?), ref: 0170BC02
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: LanguageName
                        • String ID:
                        • API String ID: 2060303382-0
                        • Opcode ID: bbf56187d807fdfe82a3189d8aada8f12fd652371199a5c17c0fd478c86895c7
                        • Instruction ID: e29a5d9c82df9cf684b6ed0c3cfe5456f3ba4545336cd49b33dfb02ab27133ce
                        • Opcode Fuzzy Hash: bbf56187d807fdfe82a3189d8aada8f12fd652371199a5c17c0fd478c86895c7
                        • Instruction Fuzzy Hash: E721D77540D3C05FC3128B25CC55B62BFB4EF87624F0981DFD8848B693D224A919CBA2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2290 170ab56-170abb1 2293 170abb3 2290->2293 2294 170abb6-170abcd 2290->2294 2293->2294 2296 170ac0f-170ac14 2294->2296 2297 170abcf-170abe2 RegOpenKeyExW 2294->2297 2296->2297 2298 170abe4-170ac0c 2297->2298 2299 170ac16-170ac1b 2297->2299 2299->2298
                        APIs
                        • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0170ABD5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 8b475c7ace67d57ad35d55ae8f44a4e7aa43ebab69a87b71216e8e609c235f00
                        • Instruction ID: d8aec04286cbae0f3c38454207ef9fec40fd566c4006d3f813850618eccd0997
                        • Opcode Fuzzy Hash: 8b475c7ace67d57ad35d55ae8f44a4e7aa43ebab69a87b71216e8e609c235f00
                        • Instruction Fuzzy Hash: 78218E72500744AEE722DB15CC44FBBFBECEB04214F04885AEA459B692D374E54C8AB5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2304 55c57d1-55c57de 2305 55c57e0 2304->2305 2306 55c57e1-55c583e KiUserExceptionDispatcher 2304->2306 2305->2306 2312 55c5840-55c584c 2306->2312 2313 55c58b3-55c58cd 2306->2313 2314 55c584e-55c5857 2312->2314 2315 55c5888 2312->2315 2319 55c58cf-55c593a 2313->2319 2320 55c5940-55c5a80 2313->2320 2317 55c5859-55c5862 2314->2317 2318 55c5864-55c5875 2314->2318 2321 55c5893-55c58b0 2315->2321 2326 55c587a-55c587e 2317->2326 2318->2326 2319->2320 2357 55c5ace-55c5adf 2320->2357 2358 55c5a82-55c5a8e 2320->2358 2326->2313 2329 55c5880-55c5886 2326->2329 2329->2314 2329->2315 2359 55c5ae4-55c5aeb 2357->2359 2358->2359 2360 55c5a90-55c5a99 2358->2360 2361 55c5a9b 2360->2361 2362 55c5aa6-55c5ab7 2360->2362 2366 55c5aa4 2361->2366 2367 55c5abc-55c5ac2 2362->2367 2366->2367 2367->2357 2370 55c5ac4-55c5aca 2367->2370 2370->2360 2371 55c5acc 2370->2371 2371->2359
                        APIs
                        • KiUserExceptionDispatcher.NTDLL ref: 055C57FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.3312655308.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_55c0000_adaFirmar.jbxd
                        Similarity
                        • API ID: DispatcherExceptionUser
                        • String ID:
                        • API String ID: 6842923-0
                        • Opcode ID: 0f063ee04d756450eefbd6d89ea7caf7ff18f19a1b6306b54a0285003cc8b849
                        • Instruction ID: 109bb7250ca6cb6d7577269c6d303e7e8f1cfa7ea533d69718b0e1d5b4546024
                        • Opcode Fuzzy Hash: 0f063ee04d756450eefbd6d89ea7caf7ff18f19a1b6306b54a0285003cc8b849
                        • Instruction Fuzzy Hash: 79212B70E042048FCB04DBF8C994ADEBBF1BB89324F2482A9D404E7751DB35AD45CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2373 170ac5e-170ac9b 2375 170aca0-170aca9 2373->2375 2376 170ac9d 2373->2376 2377 170acab 2375->2377 2378 170acae-170acb4 2375->2378 2376->2375 2377->2378 2379 170acb6 2378->2379 2380 170acb9-170acd0 2378->2380 2379->2380 2382 170acd2-170ace5 RegQueryValueExW 2380->2382 2383 170ad07-170ad0c 2380->2383 2384 170ace7-170ad04 2382->2384 2385 170ad0e-170ad13 2382->2385 2383->2382 2385->2384
                        APIs
                        • RegQueryValueExW.KERNELBASE(?,00000E24,9D8490EF,00000000,00000000,00000000,00000000), ref: 0170ACD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: 1ec9f129336304a7342586d86d4561578ab880cc10c782cccc04e6023d37c5ca
                        • Instruction ID: b6a19c8598f6971fa76a3e49ba505498e1c2db7b132df50987529dc4db4320ca
                        • Opcode Fuzzy Hash: 1ec9f129336304a7342586d86d4561578ab880cc10c782cccc04e6023d37c5ca
                        • Instruction Fuzzy Hash: E8216D755003049FE722CF15CC44FA7FBECEF04614F04845AEA45DB692D764E848CA71

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2389 170bd39-170bd8e 2391 170bd90 2389->2391 2392 170bd93-170bda2 2389->2392 2391->2392 2393 170bda4 2392->2393 2394 170bda7-170bdb3 2392->2394 2393->2394 2395 170bdb5-170bdbd DrawTextExW 2394->2395 2396 170bded-170bdf2 2394->2396 2397 170bdc3-170bdd5 2395->2397 2396->2395 2399 170bdf4-170bdf9 2397->2399 2400 170bdd7-170bdea 2397->2400 2399->2400
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0170BDBB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: 614580341868a98b361a46b9c35fd63bacf5ec6f9b7065ee5fa891cba2e6393f
                        • Instruction ID: de2799e95fb39dfe340f87c7b2bbfbf974dbb78c8c078ae24f61fcea901d5bc6
                        • Opcode Fuzzy Hash: 614580341868a98b361a46b9c35fd63bacf5ec6f9b7065ee5fa891cba2e6393f
                        • Instruction Fuzzy Hash: CC218E755087849FDB22CF65D844B52FFE8EF06310F09849AE9848B663D325E908CB61
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,9D8490EF,00000000,?,?,?,?,?,?,?,?,6CAB3C58), ref: 05A72B6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 87fc8ecdca51ea8718466d99d36f1c0845b9acb3835123af9ec29e8140b0a33b
                        • Instruction ID: ddad9fe140c3491c33b7bdc96911255e3595a3614db589770be5adca964019ab
                        • Opcode Fuzzy Hash: 87fc8ecdca51ea8718466d99d36f1c0845b9acb3835123af9ec29e8140b0a33b
                        • Instruction Fuzzy Hash: 2F21A1751097C09FDB238F25CC84A62BFB4EF47220F0984DEE9858F663C265A80DCB61
                        APIs
                        • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 0170B4E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: LibraryLoadShim
                        • String ID:
                        • API String ID: 1475914169-0
                        • Opcode ID: 50e347ff9a4a15b5705331aa2c5951a4f8d96e90cde8a31b16815bc84f8b3913
                        • Instruction ID: 036d66f802520208675aeb5f7e530eaab5f85694b5f801c7d8af0d3609b35de7
                        • Opcode Fuzzy Hash: 50e347ff9a4a15b5705331aa2c5951a4f8d96e90cde8a31b16815bc84f8b3913
                        • Instruction Fuzzy Hash: CF218EB55093809FEB228B15DC45B62FFE8EF46610F09849AE9848B293D265E908CB71
                        APIs
                        • PeekMessageW.USER32(?,?,?,?,?), ref: 05A72AB8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: MessagePeek
                        • String ID:
                        • API String ID: 2222842502-0
                        • Opcode ID: 150be255e99187cfb223875425217b3c8b4812a86c4242718a08af0742c66d89
                        • Instruction ID: 3c4a9c5ba5fe5421488a53fe40e995ebd4d68b349ae2992649ff1e902ef713a2
                        • Opcode Fuzzy Hash: 150be255e99187cfb223875425217b3c8b4812a86c4242718a08af0742c66d89
                        • Instruction Fuzzy Hash: 1421AE765097849FDB228F25DC40BA2BFB4EF06310F0884DAE9858B663D265A818DB61
                        APIs
                        • PostMessageW.USER32(?,?,?,?), ref: 05A72731
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 838f770127c5a186b73473e7488c4c015227c8cba137963f089ed4c2b39d57fc
                        • Instruction ID: b71447e1526c0639e5ea74e97b2cd13c8529d11be34b735d0801b1b186cc1b36
                        • Opcode Fuzzy Hash: 838f770127c5a186b73473e7488c4c015227c8cba137963f089ed4c2b39d57fc
                        • Instruction Fuzzy Hash: 762190754097C09FDB228F25DC45A52FFB4EF07220F0884DEED858B563D265A858DB62
                        APIs
                        • SetErrorMode.KERNELBASE(?), ref: 0170A6CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: aeeb44c406bc021cd958ad00b40fd66fbb5f2f560c4b6ec5c9bdc2ebed893846
                        • Instruction ID: 2cc4c9384e5eccb485071b8e41445d62f2f643126221dcad45b3c6846826520b
                        • Opcode Fuzzy Hash: aeeb44c406bc021cd958ad00b40fd66fbb5f2f560c4b6ec5c9bdc2ebed893846
                        • Instruction Fuzzy Hash: 7721367540A3C49FDB138B25DC54662BFB8DF47624F0980DBE9848B2A3D2696908CB72
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0170A61A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 8c4de92ca239606fc6a304dc76431a54c637c0cae0a3ad9cf5269932c1ef9834
                        • Instruction ID: 92a06e1dc417d154574b4116ca6d8f6a572f14fa837a9926581ab38ac6bb8830
                        • Opcode Fuzzy Hash: 8c4de92ca239606fc6a304dc76431a54c637c0cae0a3ad9cf5269932c1ef9834
                        • Instruction Fuzzy Hash: 08114271409780AFDB228F55DC44A62FFF8EF4A710F0888DAED858B663D275A418DB61
                        APIs
                        • SetWindowTextW.USER32(?,?), ref: 05A7191B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: TextWindow
                        • String ID:
                        • API String ID: 530164218-0
                        • Opcode ID: bf2966b30bbcba90849d28f0fd89f9d75c5eb45027c5e8737b73ef70bd73a838
                        • Instruction ID: 71ca36e0ea7b5baf3dce6026ba386f06133e3332696867b802b1bf0b5efd1d83
                        • Opcode Fuzzy Hash: bf2966b30bbcba90849d28f0fd89f9d75c5eb45027c5e8737b73ef70bd73a838
                        • Instruction Fuzzy Hash: 0F21A2725083849FDB11CF15DC45B62BFE8EF12324F0980DAE9858B263D265E919CB61
                        APIs
                        • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 05A7218F
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: FileInfoSizeVersion
                        • String ID:
                        • API String ID: 1661704012-0
                        • Opcode ID: fcbec82e44104afa8b70ca25963ede38150b857be3ff497df49ecb1d6a8389d4
                        • Instruction ID: 7ebafd334ec4366c859078eca463e915454379f50b68f9acc17da1d1273b6b47
                        • Opcode Fuzzy Hash: fcbec82e44104afa8b70ca25963ede38150b857be3ff497df49ecb1d6a8389d4
                        • Instruction Fuzzy Hash: 7F219D755093849FD722CB25CC85B56BFF8EF46210F0984DAE9858F263D378A808CB62
                        APIs
                        • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 05A72245
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: FileInfoVersion
                        • String ID:
                        • API String ID: 2427832333-0
                        • Opcode ID: d89ea2daea0a2d754aed0805ef36200720d3114a573c83874967eec801dac697
                        • Instruction ID: 20033eab40108fdf0aa4c7c8763e49723fb54fceaae3ccc23564be19a9cd9ba5
                        • Opcode Fuzzy Hash: d89ea2daea0a2d754aed0805ef36200720d3114a573c83874967eec801dac697
                        • Instruction Fuzzy Hash: C21181755093449FDB218B15DC45F62BFB8EF46610F08809EED858B663D261E808CB61
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,9D8490EF,00000000,?,?,?,?,?,?,?,?,6CAB3C58), ref: 0170BE6C
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: c4d063bc04a6c39ef4b15d6aaffde0d399d9dbd55b421cdca9c41901353a0669
                        • Instruction ID: d5199fa06ea197d843f3e64b06781845d29595bf5231a5ff3e5c0a5395f88d1e
                        • Opcode Fuzzy Hash: c4d063bc04a6c39ef4b15d6aaffde0d399d9dbd55b421cdca9c41901353a0669
                        • Instruction Fuzzy Hash: B011B1754097C09FD712CB25DC85A52BFF8EF07210F0980DAE9858F2A3C274A948CB71
                        APIs
                        • DispatchMessageW.USER32(?), ref: 05A72C18
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: DispatchMessage
                        • String ID:
                        • API String ID: 2061451462-0
                        • Opcode ID: 4895e95e8b8d8a170655b2a2b4fe0f51b01ea894dc2afab9308b2e5b3a48c7a6
                        • Instruction ID: 09ae586f68c272f0f61615930cd639bfea03c90d54dda997b268a1d4f62d3549
                        • Opcode Fuzzy Hash: 4895e95e8b8d8a170655b2a2b4fe0f51b01ea894dc2afab9308b2e5b3a48c7a6
                        • Instruction Fuzzy Hash: 5C1181754093C49FDB228B15DC44B62BFB4EF47624F0984DEED854F263D2656808CB72
                        APIs
                        • SHAutoComplete.SHLWAPI(?,?), ref: 0170AAEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: AutoComplete
                        • String ID:
                        • API String ID: 4247635402-0
                        • Opcode ID: 46ba1bcc0f0d54a2ac02895a2b4015e989732bf300358b626e5f5973f4b01317
                        • Instruction ID: 5880f05ed1852d830fb6afe2326fe048a4ded5f64a0a123409b1cb7859c844bb
                        • Opcode Fuzzy Hash: 46ba1bcc0f0d54a2ac02895a2b4015e989732bf300358b626e5f5973f4b01317
                        • Instruction Fuzzy Hash: F3117C7540D7C09FCB138B259C45A52BFB4EF07220F0984DEE9844F2A3D265A948CB62
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 19db1c8ed6fefae217d14e0d4b991d8d4e813afdd13541423d7dae21b6f73059
                        • Instruction ID: 4d19e50fca2f6d86062c0e2629473036065c13ddba7013daeff7d963ddfd52c5
                        • Opcode Fuzzy Hash: 19db1c8ed6fefae217d14e0d4b991d8d4e813afdd13541423d7dae21b6f73059
                        • Instruction Fuzzy Hash: A611BF715493849FDB12CF15DC45B52BFB4EF06224F0884DAED858F293D275A808CB62
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0170BDBB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: b19039a86350ce8b12914f632711f4ee6746429d7396b0934bdc43fb01dafe8d
                        • Instruction ID: 6154ca560d97fe475e80cc3c0a01f02b19f7aa155b087a78338c37ef74d84970
                        • Opcode Fuzzy Hash: b19039a86350ce8b12914f632711f4ee6746429d7396b0934bdc43fb01dafe8d
                        • Instruction Fuzzy Hash: 2A115E75504344DFEB21CF65D944B62FBE8EF04320F08C4AADE458B652D375E548CB62
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: 55fb0670b0050819f9c48a46cfb81e67ab03bd76adff676f40fd459c9308f930
                        • Instruction ID: 46c4a92dcbece13a1d5d9b5e6dca44ea3285c657ec3d47a7aa1c464d8546219b
                        • Opcode Fuzzy Hash: 55fb0670b0050819f9c48a46cfb81e67ab03bd76adff676f40fd459c9308f930
                        • Instruction Fuzzy Hash: 021165716042488FEB10DF15DC85F76BBE8EF05620F08C4AADD55CB742D374E444CA61
                        APIs
                        • SendMessageW.USER32(?,?,?,?), ref: 05A71A65
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 62c797e35859e219349e31260cff088be8e40b2bad8e08fbb3c74d6435029126
                        • Instruction ID: c486ba15d741517eb61af72bf7d20d1eb94a31fab5f6c5074a0f529305a2acc7
                        • Opcode Fuzzy Hash: 62c797e35859e219349e31260cff088be8e40b2bad8e08fbb3c74d6435029126
                        • Instruction Fuzzy Hash: D711AC71409784AFDB228F15DC44E62FFF4EF06220F08C49EEA844B663D275A858CB62
                        APIs
                        • SetWindowLongW.USER32(?,?,?), ref: 0170AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: LongWindow
                        • String ID:
                        • API String ID: 1378638983-0
                        • Opcode ID: 08e276226d2fe210ce5259482aa101784a18f8c4eb26a5d6e9b249560ba37de0
                        • Instruction ID: 241d04e05c957f82d909898d7e46ffd45c397bae95c2d607f4563cab7fe5546a
                        • Opcode Fuzzy Hash: 08e276226d2fe210ce5259482aa101784a18f8c4eb26a5d6e9b249560ba37de0
                        • Instruction Fuzzy Hash: E011AC714097849FCB22CF15DC84A52FFF4EF06220F08C4DAE9854B2A3C275A948CB62
                        APIs
                        • DeleteFileW.KERNELBASE(?), ref: 05A720D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: 302e4b51e3ccc3f3cde938f9dffcb0c9b0e5136446bc601c7c0502543c57251b
                        • Instruction ID: bc185129fbfc8c5417f268e129aed4658d39fa38ce53b027104f02b23a9d4565
                        • Opcode Fuzzy Hash: 302e4b51e3ccc3f3cde938f9dffcb0c9b0e5136446bc601c7c0502543c57251b
                        • Instruction Fuzzy Hash: 340152756042488FDB10DF25DD85B66FBE8EF05220F08C4AADE46DB752D375E848CA61
                        APIs
                        • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 0170B4E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: LibraryLoadShim
                        • String ID:
                        • API String ID: 1475914169-0
                        • Opcode ID: 076c2a5355f33f563562c1673645e85a5310d058ed689d564b81a8ceabf9c326
                        • Instruction ID: a88bc2f28d1459d4969b12de7b88452cb16e5d97a714f9b350dcff4b16e6638e
                        • Opcode Fuzzy Hash: 076c2a5355f33f563562c1673645e85a5310d058ed689d564b81a8ceabf9c326
                        • Instruction Fuzzy Hash: 19019275500304DFEB21CF1AD885B22FBE8EF54620F08C499ED498B792D375E608CA71
                        APIs
                        • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 05A72245
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: FileInfoVersion
                        • String ID:
                        • API String ID: 2427832333-0
                        • Opcode ID: 28daec63f979ff11344fce1fbba9722e44c620c93d033ca528081dfd32d98267
                        • Instruction ID: 33c385129c325dbd187f24d96a0feb4812eb0a75778316f264372f6891d7a665
                        • Opcode Fuzzy Hash: 28daec63f979ff11344fce1fbba9722e44c620c93d033ca528081dfd32d98267
                        • Instruction Fuzzy Hash: 100192765042488FDB20CF16DD44B66FBE8EF04220F08C09EDE458B762D375E448CEA1
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0170A61A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: d78ccaf29e23cd87e4feef76df814669b82029eefce743b2606f94a629c6810f
                        • Instruction ID: d975be847537d4cc2305a5ca366394a31abfaec374a68891642e0c6d77104b76
                        • Opcode Fuzzy Hash: d78ccaf29e23cd87e4feef76df814669b82029eefce743b2606f94a629c6810f
                        • Instruction Fuzzy Hash: 97013972404744DFDB228F55D944B62FFE4EF48720F08C89AEE494B652C375A418DB62
                        APIs
                        • SetWindowTextW.USER32(?,?), ref: 05A7191B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: TextWindow
                        • String ID:
                        • API String ID: 530164218-0
                        • Opcode ID: 6fb443ce389fe3dc1eb1dbcbc42ed057d0d0580240ad31d074691d5ef5d6cb85
                        • Instruction ID: c274588163288a83b1786e88cfd5f623b8ca184867da1138380a09f9aa7e5620
                        • Opcode Fuzzy Hash: 6fb443ce389fe3dc1eb1dbcbc42ed057d0d0580240ad31d074691d5ef5d6cb85
                        • Instruction Fuzzy Hash: 250188765042488FDB10DF16DD45B72FBE8EF05620F08C0AEDD458B752D275E459CA61
                        APIs
                        • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 05A7218F
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: FileInfoSizeVersion
                        • String ID:
                        • API String ID: 1661704012-0
                        • Opcode ID: 9c8a5cee3b3771cb8dae7ffc748df76089d091223ec9a122bf9a70a2f5319ffe
                        • Instruction ID: aebf979108b49007e883c88edf644f45820fe2bcceb0026a59edb91d711a74fb
                        • Opcode Fuzzy Hash: 9c8a5cee3b3771cb8dae7ffc748df76089d091223ec9a122bf9a70a2f5319ffe
                        • Instruction Fuzzy Hash: 7901B1755042489FEB20CF15DC84B6AFBE8FF44220F08C4AADE499B342D374E448CA61
                        APIs
                        • VerLanguageNameW.KERNELBASE(?,00000E24,?,?), ref: 0170BC02
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: LanguageName
                        • String ID:
                        • API String ID: 2060303382-0
                        • Opcode ID: fc6d94b0800d8b5b89dee15524ae2732d78b6a1e4a0acc73e7356c0d2b81cbb8
                        • Instruction ID: 7be950dad997bc9781906c35e1c8508641fc772543c5772de8d82ab4a4a742fc
                        • Opcode Fuzzy Hash: fc6d94b0800d8b5b89dee15524ae2732d78b6a1e4a0acc73e7356c0d2b81cbb8
                        • Instruction Fuzzy Hash: 2B016271540600ABD310DF16DC46B76FBE8FB88A20F14815AED089BB42D775F925CBE6
                        APIs
                        • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 0170B109
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 5c066829412df91503db16d22e07845c11ae511dd1ce4d507562d13cdd3b43f4
                        • Instruction ID: e1f1051db6885f838c95c3faa298e2e38690b963df6a21596220e6a622ed5ce2
                        • Opcode Fuzzy Hash: 5c066829412df91503db16d22e07845c11ae511dd1ce4d507562d13cdd3b43f4
                        • Instruction Fuzzy Hash: F2018671540600ABD310DF16DC46B76FBE8FB88A20F148159ED089BB42D775F915CBE6
                        APIs
                        • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 05A73A86
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: ec39e6166273020fc4b701d143725ed512a101f50070ec682f8b6cae14d4d2a6
                        • Instruction ID: 0b53b80df03a3651cd4b80879a61c97dcfa4f40a86ee0fe95bc4b888e43892c2
                        • Opcode Fuzzy Hash: ec39e6166273020fc4b701d143725ed512a101f50070ec682f8b6cae14d4d2a6
                        • Instruction Fuzzy Hash: E701A271540200ABD310DF16CC46B76FBE8FB88A20F14811AED089BB42D775F925CBE6
                        APIs
                        • PeekMessageW.USER32(?,?,?,?,?), ref: 05A72AB8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: MessagePeek
                        • String ID:
                        • API String ID: 2222842502-0
                        • Opcode ID: b52a4be3422aa5a120eeeadce5cc84eb2a68810577a10916a6d115bc3046367e
                        • Instruction ID: a15f313aec343f7d0b51193036ccf9966e6692fd985418b1f44c7684c4d7dee7
                        • Opcode Fuzzy Hash: b52a4be3422aa5a120eeeadce5cc84eb2a68810577a10916a6d115bc3046367e
                        • Instruction Fuzzy Hash: 6F0192365006449FDB308F15DD45B62FBE4EF04220F08C49EDE454A652D375E458DB61
                        APIs
                        • PostMessageW.USER32(?,?,?,?), ref: 05A72731
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 48278d595a253b708f352525a9714ed5bd2b223e9fb772698b55594aa4b390d1
                        • Instruction ID: 0782b9c151d4c00d2fb60160a15651e19e946be28f7ffceec7dd01c279de67c8
                        • Opcode Fuzzy Hash: 48278d595a253b708f352525a9714ed5bd2b223e9fb772698b55594aa4b390d1
                        • Instruction Fuzzy Hash: 4201B13A5002048FDB20CF15DD44F66FBE5EF04220F08C09EDE454A762C375E458CB62
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,9D8490EF,00000000,?,?,?,?,?,?,?,?,6CAB3C58), ref: 05A72B6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: c9a20d61837b8839ca8b6768ca4adb4be117de96fdd06c9dcf1448a9af76dd57
                        • Instruction ID: 4eba13bf41900d7a5caa4ef5417230981408b174ca56059a419ea06fcfe0159e
                        • Opcode Fuzzy Hash: c9a20d61837b8839ca8b6768ca4adb4be117de96fdd06c9dcf1448a9af76dd57
                        • Instruction Fuzzy Hash: DE0171365006449FDB20CF15DC84F66FBE4EF44220F08C49EEE454A762D375E458DB61
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,9D8490EF,00000000,?,?,?,?,?,?,?,?,6CAB3C58), ref: 0170BE6C
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 343124d1b3f76ef69d856f732471d8670cef7abe90d4665f2f4ae119b123f1ac
                        • Instruction ID: f71e69bf94a29fec9b74f5809a18da332362835799c40d5689be38699296559c
                        • Opcode Fuzzy Hash: 343124d1b3f76ef69d856f732471d8670cef7abe90d4665f2f4ae119b123f1ac
                        • Instruction Fuzzy Hash: 9601D139500344CFDB21CF19D984762FBE8EF09220F08C0AADE498B792C374F948CA62
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: c9fe96ab548546ad27faa3ac4859f8248227105045ab5be35bb36a9527e23362
                        • Instruction ID: a913a00e79d93bd43a1344be495db6dff56aec02da2645db22a003e5ec2469c8
                        • Opcode Fuzzy Hash: c9fe96ab548546ad27faa3ac4859f8248227105045ab5be35bb36a9527e23362
                        • Instruction Fuzzy Hash: C3018B75904344CFDB21CF19D984762FBE4EF04220F08C4AADD499F392D379A548CAA2
                        APIs
                        • SendMessageW.USER32(?,?,?,?), ref: 05A71A65
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 69a71eb44592fc1745e98614766ef9cfc3200b4258b8ff5bdf4a60102752148d
                        • Instruction ID: 9c2d509c95c246612975994bdcd48e0242847fc19700895ec9dffd1cddbce0b5
                        • Opcode Fuzzy Hash: 69a71eb44592fc1745e98614766ef9cfc3200b4258b8ff5bdf4a60102752148d
                        • Instruction Fuzzy Hash: 8E018B36404B489FDB20CF05EC84F61FBE5EF08220F08C49EDE494A662D375A458CFA2
                        APIs
                        • SetWindowLongW.USER32(?,?,?), ref: 0170AA4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: LongWindow
                        • String ID:
                        • API String ID: 1378638983-0
                        • Opcode ID: 2c016809d054a5ddf3275984dbd08c617a8ed9f79aff7bc47322632fcbab3e15
                        • Instruction ID: 6dc8888dadfa429116559f7fa15d8e35cd27f39ee54788bef0d112203830f37d
                        • Opcode Fuzzy Hash: 2c016809d054a5ddf3275984dbd08c617a8ed9f79aff7bc47322632fcbab3e15
                        • Instruction Fuzzy Hash: F601AD76400744CFDB21CF05DA84B62FBE4EF04720F08C09ADE454B792C375A588CEA2
                        APIs
                        • SHAutoComplete.SHLWAPI(?,?), ref: 0170AAEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: AutoComplete
                        • String ID:
                        • API String ID: 4247635402-0
                        • Opcode ID: 7a613bbc950417e98e42fa91f635f090d8045924e52f9ef298311c6cca5386ec
                        • Instruction ID: 35e64fa3a9485e2e56899a3d52207a6e792ce7f9f7cfb7af057e86f279f5771c
                        • Opcode Fuzzy Hash: 7a613bbc950417e98e42fa91f635f090d8045924e52f9ef298311c6cca5386ec
                        • Instruction Fuzzy Hash: C1018C75904744CFDB21DF0AD984B62FBE4EF04624F08C49ADE494B792C375A588CEA2
                        APIs
                        • SetErrorMode.KERNELBASE(?), ref: 0170A6CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311051085.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170a000_adaFirmar.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 181021485f3e801ce33a6bef7a00a5089bcb2663aa71b260443897d285067c03
                        • Instruction ID: 5a3826d8ce2624876ebdade9146b879425374f504ea23a0c8e6d298054a054cb
                        • Opcode Fuzzy Hash: 181021485f3e801ce33a6bef7a00a5089bcb2663aa71b260443897d285067c03
                        • Instruction Fuzzy Hash: 7DF08C35804344CFDB21DF09DD84761FBE4EF44324F08C09ADE494B796D279A448CAA2
                        APIs
                        • DispatchMessageW.USER32(?), ref: 05A72C18
                        Memory Dump Source
                        • Source File: 00000000.00000002.3313101656.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5a70000_adaFirmar.jbxd
                        Similarity
                        • API ID: DispatchMessage
                        • String ID:
                        • API String ID: 2061451462-0
                        • Opcode ID: 423de44f90df86ca90e3fca4d6f0bc157c29ef15424baa3f3f33dcd1a200cd41
                        • Instruction ID: b3708adf7febc638cbb3b021fbc456b24ddc003370b02bb40d1022e26a1004ac
                        • Opcode Fuzzy Hash: 423de44f90df86ca90e3fca4d6f0bc157c29ef15424baa3f3f33dcd1a200cd41
                        • Instruction Fuzzy Hash: C4F0AF794042488FDB20CF05DD85B72FFE8EF14220F08C4AADE494B752D379A448CAA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3310845255.0000000001520000.00000040.00000020.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1520000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bccb6ab207d7f9db62ca9c0502b6e18f231e7b8cccc4e61b521c2507785bb6d3
                        • Instruction ID: c367417d2cd65e4fad7d35bf1725ed61ffaedb0c699fc2e92e5606d41dcfaa4c
                        • Opcode Fuzzy Hash: bccb6ab207d7f9db62ca9c0502b6e18f231e7b8cccc4e61b521c2507785bb6d3
                        • Instruction Fuzzy Hash: 3611D232205280DFD715CB14C980B26BBE5EB8A708F28C99CF5491BAD2C777D803CA91
                        Memory Dump Source
                        • Source File: 00000000.00000002.3310845255.0000000001520000.00000040.00000020.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1520000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a85b9c7f64c778c39299ce3663d208794cb9b2525211c8cf0f05265b18245d19
                        • Instruction ID: 2cad30597880f2facedec2f3d76d37a70f67d8835a201070c5aba0713757ca08
                        • Opcode Fuzzy Hash: a85b9c7f64c778c39299ce3663d208794cb9b2525211c8cf0f05265b18245d19
                        • Instruction Fuzzy Hash: 341130355492849FC716CB10C590B15BFB1FB46704F18C6DEE4495B6A3C33A9817CB41
                        Memory Dump Source
                        • Source File: 00000000.00000002.3310845255.0000000001520000.00000040.00000020.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1520000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 14664d08f64560456c85160eeae124181e4e9735a85c5977854710a13c91930c
                        • Instruction ID: 56373f8b0b7327a7694bc66b097b88bf136853ef22382364d695e796aff134d9
                        • Opcode Fuzzy Hash: 14664d08f64560456c85160eeae124181e4e9735a85c5977854710a13c91930c
                        • Instruction Fuzzy Hash: 9EF044B65097846FD7118F06AC40862FFE8EB86620749C49FED498B652D235B908CBB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3310845255.0000000001520000.00000040.00000020.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1520000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8a11042dbb76d8c4b470108bb827fa426ec514a798d586de0fb5dc0e7223f307
                        • Instruction ID: 00c882aa9db264e68678db60d2e1632d1ca8e287ce5ca12ee277436e4926ff25
                        • Opcode Fuzzy Hash: 8a11042dbb76d8c4b470108bb827fa426ec514a798d586de0fb5dc0e7223f307
                        • Instruction Fuzzy Hash: 82F01D35144644DFC306CB44D980B16FBA2FB89718F24CAADE9490B792C737E813DE81
                        Memory Dump Source
                        • Source File: 00000000.00000002.3310845255.0000000001520000.00000040.00000020.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1520000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c71ae4db147db07f07f6c92666816a75bc9718c42950f272f0d4a336f9a9531f
                        • Instruction ID: bfb1fc02864d8466cc1f7abbc37b5be31a3c77602a871c519d3cfe638e14a799
                        • Opcode Fuzzy Hash: c71ae4db147db07f07f6c92666816a75bc9718c42950f272f0d4a336f9a9531f
                        • Instruction Fuzzy Hash: 7AE092B66006044B9650DF0BEC41462F7D8EB84630708C47FDC0D8B702D639B508CAA6
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311028013.0000000001702000.00000040.00000800.00020000.00000000.sdmp, Offset: 01702000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1702000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b2298747550c3a46d8bbff0371af62921bc6c53c599ad1b4a2600534d8b9b148
                        • Instruction ID: 49da3b59825d0992fbab4dfc260f918fd28d34ad30eed8e86fcb939add19a757
                        • Opcode Fuzzy Hash: b2298747550c3a46d8bbff0371af62921bc6c53c599ad1b4a2600534d8b9b148
                        • Instruction Fuzzy Hash: 74D02E3A3017C08FE3138A0CC2ACB853BE4AB40704F0B00F9AC008B7A3CB68D8C0E600
                        Memory Dump Source
                        • Source File: 00000000.00000002.3311028013.0000000001702000.00000040.00000800.00020000.00000000.sdmp, Offset: 01702000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1702000_adaFirmar.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3850322a9bf7c0977d44663cf6115ca40fb7fd971ae894870c9b71f5e4f5dc80
                        • Instruction ID: b9e725c7952f69e79450b74abfc7331983490142bf0b07ea2ad460c20294ab15
                        • Opcode Fuzzy Hash: 3850322a9bf7c0977d44663cf6115ca40fb7fd971ae894870c9b71f5e4f5dc80
                        • Instruction Fuzzy Hash: FFD05E352006818BDB16DA0CD2D8F59BBD8AB44714F0644E8AC108B7A2C7B4D8C4DA40